(r0, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000100)) 23:00:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 257.660113] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[10524] [ 257.703070] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10530] [ 257.768568] ptrace attach of "/root/syz-executor5"[8103] was attempted by "/root/syz-executor5"[10533] 23:00:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:26 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80807, 0x44f0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000080)=0x9, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) fchown(r0, r1, r2) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:26 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:27 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:27 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000300)={0x0, 0x4, 0x1f, &(0x7f00000002c0)=0x6}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000340)={'security\x00', 0x10000000000003a5, [{}, {}]}, 0x276) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000400)=0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0xdf, "8668c8a8a8dee26d763ebf45ee5f5bddf9297b0171d854ed705668ca726cbb583d321abf94876e2f2723d0d1e4f27c1abcc779d05ec4466acf581bae4479739c8ac1496b41c476268ec24c2914535a47ed90c478b36ebc5e427f5f8bcf89c84b11f156f851d88b79a5ffd3a84e5626f369e09a7642ebb448ed4c19c203682149654bd064821a32020d7977a231e9f601c3cde6db88428e696419e7a5eba8d8c7ff66e8de7a82564bcfd6b4b586d169633664addabd1cfd92c09f99156920dcf45a575b05f4d2ae4e2e6c06a675745cd7ba8e9ad3caf9e7a7545a9e3d931452"}, &(0x7f00000001c0)=0xe7) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x1, 0x8000, 0x101, 0x7f, r3}, &(0x7f0000000240)=0x10) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:27 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:27 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:27 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:27 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:27 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4000, 0x0) mmap$binder(&(0x7f0000ae7000/0x4000)=nil, 0x4000, 0x4, 0x2010, r0, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 259.754465] net_ratelimit: 18 callbacks suppressed [ 259.754488] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:28 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:28 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:28 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfd, @dev={0xfe, 0x80, [], 0x1a}, 0x5}, {0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, r1, 0x4}}, 0x48) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 260.136712] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 260.149171] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 260.176466] __report_access: 13 callbacks suppressed [ 260.176497] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10655] 23:00:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 260.263974] ptrace attach of "/root/syz-executor5"[8103] was attempted by "/root/syz-executor5"[10653] [ 260.294926] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[10656] 23:00:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:28 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000180)={0x3fffffffc000000, 0x0, 0x400000000000}) accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10, 0x80800) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8200, 0x0) mmap(&(0x7f00009f1000/0x3000)=nil, 0x3000, 0x1000004, 0x8976, r1, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:28 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 260.527855] ptrace attach of "/root/syz-executor3"[8096] was attempted by ""[10673] [ 260.558107] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 260.639014] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 260.741179] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10690] [ 260.771578] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[10686] 23:00:29 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x0, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:29 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x90010, 0xffffffffffffffff, 0x800000) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000000c0)=""/71) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0xfff], &(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) setresuid(r0, r1, r2) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000480)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0x5, 0x1000, {0x30, 0x3, 0x4}, 0x0, 0x5, 0x0, 0x80000001, 0xc, '/dev/rfkill\x00', 0xc, '/dev/rfkill\x00', 0xf, 'systemeth1em1&[', 0x3, 'em1'}}, 0x64) 23:00:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:29 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 261.008449] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 261.039607] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:29 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x80000000000) [ 261.074256] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10699] 23:00:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 261.130720] ptrace attach of "/root/syz-executor5"[8103] was attempted by "/root/syz-executor5"[10702] 23:00:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:29 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 261.275707] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[10724] 23:00:29 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 261.395320] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 261.431090] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 261.449586] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10736] 23:00:30 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x0, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:30 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x12010}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r1, 0x104, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x10) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2000002, 0x8972, 0xffffffffffffffff, 0xfffffffffffffffc) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:30 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:30 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 262.018550] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:30 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x440, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x2}, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') r2 = timerfd_create(0x0, 0x80000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)={0x8}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:30 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:31 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x0, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:31 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:31 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = gettid() move_pages(r0, 0x3, &(0x7f0000000080)=[&(0x7f000098b000/0x3000)=nil, &(0x7f0000a10000/0x3000)=nil, &(0x7f0000a7e000/0x3000)=nil], &(0x7f00000000c0)=[0x3f, 0xfffffffffffffff9], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x6) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000340)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:31 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'lo\\user\\,vboxnet0vboxnet0'}], 0xa, "71a833f8ac1f8dd7eb60140fa055e9426240e216a951c9dc08bd1568e5a7137536f37fe27030d65a5642b85ef3cb3ad8ed71f858de86193e3c4915fdb559cd0067fd842a66046290829c74c4214302e9d26070ae976c6322d14017fb31c8bdd72194ad73a056446d53ed117ac2804d433742dc57cac739b024d29123b2f772fa4a114b08eed10dacc20bc13d6db6cd5a204f5f47daf5f340292fca5289178961653829bfcd285c1ae3a74ff97551cac69128e6b8"}, 0xd9) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x8}) 23:00:31 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:31 executing program 1: pipe2(&(0x7f0000000100), 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, r0, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x40400) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ba7000/0x1000)=nil, 0x1000}) 23:00:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000000180)}}, {{0x0, 0x0, &(0x7f0000002bc0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0c000000290000000400000046a186bb9c730b57345fa347bd079daea7e7c07185039e1db1eec3a84a425b12b5af5cc0c8c5e01bdf237d6ed6999dfcec735b385d1a2e428b97d928e5ea1b9d7eef91e93780c37a8469ff9da95d4a3f9f15701904bd246f292c399eeefbf9e31efc15b9dbd4d33e832c4f4da8d114e447c281b1b00d93bcf3210bd9bde97b7a7e9ec410324f202455b15c5e279e7c"], 0xc}}], 0x2, 0x0) [ 263.485482] cgroup: fork rejected by pids controller in /syz3 23:00:32 executing program 5: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setuid(0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x440802, 0x0) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000005c0)='em1cpusetmd5sum[\x00') r3 = geteuid() sendmsg$nl_netfilter(r0, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x42c, 0x13, 0x6, 0x20, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0xa}, [@typed={0x4, 0x91}, @nested={0x4, 0x63}, @typed={0xc, 0x38, @u64=0x8}, @typed={0xc, 0x58, @u64=0x70bb}, @typed={0xc, 0x43, @u64=0x4ea3}, @nested={0x1ac, 0x1b, [@typed={0x8, 0x51, @uid=r1}, @generic="3370dc6b2354ba1e30db36d44d838f394f1ccae285bedd809c5fc534984857d9c3452df59118062f134b975bb4d5e4fd74b4810d12e77fe624a30c488aa9496f9056fddb91d04492fc30b2284e28053939ef1a8bc04054cd47c0b89869a2c8e8c689ee5008c5c2a47d4c99c6418dcae351114f5a175e20c64eb0aab315d942a3135310cf245c69e642d1a4751f78298b48cfb71271f95fbba599e2e82560af134544e45a66433423b67ba110e618a4f022", @typed={0x8, 0x33, @pid=r2}, @generic="354e9b5073aaf73e3d993a8bd44d171d7fb224e779183e767ce863dda74d14d0c485dc0e4a35ec4a0c00584246e8be997129ecc149e47110a84b931ad82490b844a34aa39d7f760734a6b7330d4e5384bb1dc90ce8f76d5fbb0618e03ccd8a466ecb60633b38d3d18bcca7fa21814ccba43900c7a0984f", @generic="c4a8a5bff6dc20c796dba6ec68ec636accc6dd66ef9ad77d43a0ca594ae06bd9bfde611fd935293e30e5b67e417c12ed0bc78670e6398fa8db33be810abe306ab904823f0d483d365a36802a857df1990692f0bb2525b36b1eeb97f3de38321299346406b9", @typed={0x8, 0x41, @u32=0x3}]}, @nested={0x74, 0x86, [@typed={0x14, 0x18, @ipv6=@rand_addr="16f83c655c3afbffc7af1ac375e7fc74"}, @typed={0x8, 0x68, @str='\x00'}, @generic="b2896f1ce4", @generic="454709136986b99e5a4f8e6e58475d97da88f7bfa0d8de3dab0122192d674b2240b14f99d83c0f42e322cc581d7946109ba1693597f63cbb8be622499e131c97fef8d174b4", @typed={0x8, 0x0, @uid=r3}]}, @nested={0x1cc, 0x25, [@typed={0x8, 0x77, @u32=0x7ff}, @generic="ec75f74fd66e1c0036bad212ee929c747b002e9763fa130ffa2c015ff406becc457cb3d9c46ac7cf0db466775296d7ee7f55dcbf9315682eb8034d1f30bc1c7fda8c720f273a0896e8ed96b7f5f8fd1a1b4a1b2d60374cd3237f927973e1bcdee5847051a5d563d89561bdeb2674744718e49acbc3f98e2defa476f2c6d50164a9e71872143da2da032b939a43665abfc8636b69042024537ea4b676abe92ac27ebfd96aa5f61d59ad6a13049d83b224d4e86d7e", @generic, @generic="12065c8b170c56dfadd1beea624b3f2f877732bd1dccc771844e35dbf40ae40d5a3a3e0a0ac2b7519214e65baf1c01e60ac4714d93eed1f3bf05cb933e4dcbb547a2613871fe6f8972899f83b823cca0e67eeae8507934637c2cf58ea1294e8a3f8e30b89f856be95fea9e7bdb4fdc84736f2a556afa05184d3fa56c64e85059800bb0535e7787ce8b562557bd0deeafe06de7c798c36c4278d67af401e6fdd7876e353898c874662a87072015adf2fdb4bbb7a3c7735d2600833fb09de9487c9a4d9301a832c923a2cb357dfd106dfcedb429210c818e2e640a0c1acf9396295147056251f2b2a79b9d7b9e54895937d743", @typed={0xc, 0x90, @u64=0x8001}, @typed={0xc, 0x7b, @u64=0x7fffffff}]}]}, 0x42c}}, 0x44) 23:00:32 executing program 2: unshare(0x20020000) mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000280)='./file0\x00') r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x8, 0x1) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000080)={0x0, 0x8, "aced9a3ab12b4e838a94233b9f1518ab024fd40e1bd0dc8d35810363dbaee738", 0x9, 0x5, 0xfffffffffffffff7, 0x7, 0x8}) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f0000000200)='./file0\x00') poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f0000000180)='./file0\x00') 23:00:32 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:32 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x0, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:32 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xfffffffffffffff7, 0x10000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f0000000340)={r1, &(0x7f0000000280)=""/72}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x10100, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$TIOCNXCL(r2, 0x540d) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) connect$rds(r3, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x1000804000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0x8, 0x1, {0x3, 0x1, 0x2, 0x1, 0x8001}}) getpid() creat(&(0x7f0000000380)='./file0\x00', 0x149) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000080)=0xffffffffffffffff) 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 263.876997] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) [ 263.935561] QAT: Invalid ioctl 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:32 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x8, 0x1, 0x2}) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffe94}, 0xe3c7) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x3, r1}) 23:00:32 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 264.133418] QAT: Invalid ioctl 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:32 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x800008972, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc010643a, &(0x7f00000000c0)={0x4000000, 0x1, 0x15}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r3, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r4 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:32 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:32 executing program 2: 23:00:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r3, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r4 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:33 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x0, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:33 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x3, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) connect(r0, &(0x7f0000000140)=@un=@file={0x0, './file0\x00'}, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x1c) 23:00:33 executing program 2: [ 264.862523] net_ratelimit: 10 callbacks suppressed [ 264.862563] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:33 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:33 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc040564a, &(0x7f00000001c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 23:00:33 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8008000100000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 23:00:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:00:33 executing program 2: fremovexattr(0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xf, 0x6, 0xffffffffffffffff}, 0x14}}, 0x0) 23:00:33 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000380)={0x0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) clone(0x2, 0x0, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="c58775a030349e") ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$sndctrl(0x0, 0x2, 0x321002) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x430201}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:33 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r3, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r4 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:33 executing program 2: [ 265.669478] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:34 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x0, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:34 executing program 5: 23:00:34 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:34 executing program 2: 23:00:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:34 executing program 2: 23:00:34 executing program 5: 23:00:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:34 executing program 1: move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:34 executing program 5: 23:00:34 executing program 2: 23:00:34 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 266.421704] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:35 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x0, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:35 executing program 5: 23:00:35 executing program 2: 23:00:35 executing program 1: r0 = gettid() move_pages(r0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x60de, 0x408000) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000100)=""/206) dup3(r1, r2, 0x80000) 23:00:35 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:35 executing program 5: 23:00:35 executing program 2: [ 267.119464] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:35 executing program 5: 23:00:35 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2c9, 0x80082) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000000c0)={0x9, 0x1, {0x3, 0x2, 0x3a, 0x2, 0x3}}) 23:00:35 executing program 2: [ 267.270803] __report_access: 13 callbacks suppressed [ 267.270833] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[10997] 23:00:35 executing program 5: 23:00:36 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x0, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000180)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 23:00:36 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:36 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x2040, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0), 0x4) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f00000002c0)={0x3, 0x1000, 0xed57}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0xc00, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xb1}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 23:00:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000046000/0x2000)=nil, 0x2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 23:00:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:36 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000140)=0x3) [ 268.056965] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 268.135920] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[11037] 23:00:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:36 executing program 5: syz_open_dev$media(0x0, 0x3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x1000000000000001) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 23:00:36 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 268.341191] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:36 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:36 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x0, 0xff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) ioprio_get$uid(0x0, r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f"], 0xcf) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440), 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)={'syz0'}, 0x4) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 23:00:37 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x0, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:37 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:37 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x16) 23:00:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:37 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 269.056298] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 269.120336] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[11083] 23:00:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:37 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:37 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x200, 0x200000) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000000c0)=0x7f) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:37 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 269.313045] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 269.403219] ptrace attach of "/root/syz-executor3"[8096] was attempted by "/root/syz-executor3"[11096] 23:00:37 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:37 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:37 executing program 1: mmap(&(0x7f0000bda000/0x3000)=nil, 0x3000, 0x80000002, 0x8976, 0xffffffffffffffff, 0xffffffffffffffff) move_pages(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)=[0x40], &(0x7f00000000c0), 0x0) fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setgroups(0x2, &(0x7f00000001c0)=[r0, r1]) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x83fff) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000080)={0x3, r2}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000200)=0xeb9, 0x4) ioctl$RTC_EPOCH_SET(r2, 0x4004700e, 0xff) 23:00:37 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:38 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x20000) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:38 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 269.968242] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:38 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:38 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 270.159216] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 270.355202] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[11140] 23:00:38 executing program 1: move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = socket$netlink(0x10, 0x3, 0x16) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r1, 0xf04, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x43}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) 23:00:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:38 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:38 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 270.635527] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 270.725915] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:39 executing program 1: mmap(&(0x7f0000a78000/0x4000)=nil, 0x4000, 0x7, 0x8972, 0xffffffffffffffff, 0x4) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="10ec455a0a20348c6786fb2d05ff18006d242cceb8763ac398b8da07c8f3933f1883ca830f5a54c897cb5c80bfcc0fab89d38213c10ebcf7bf9ca9ce2b32e7b1837b4d728363804948b11411b85dfdf5cbede6a6947385"], 0x2d, 0x2) [ 270.848247] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[11168] 23:00:39 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000380)={0x0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) clone(0x2, 0x0, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="c58775a030349e") ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$sndctrl(0x0, 0x2, 0x321002) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x430201}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:39 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:39 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x42) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f0000000200)={r1, 0x9, &(0x7f0000000100)=[0x1f, 0xfff, 0x6, 0xfff, 0x7fffffff, 0x8, 0x3, 0x28, 0xc8], &(0x7f0000000140)=[0xf68d, 0x6, 0x5, 0x9, 0x10000, 0x3, 0x21], 0x21, 0xa, 0x4, &(0x7f0000000180)=[0x3, 0xfffffffffffffff7, 0x9, 0x81, 0x800, 0x7fffffff, 0x200, 0x20, 0x0, 0x7a], &(0x7f00000001c0)}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:39 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:39 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 271.227175] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:39 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xdba}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0x2, 0x0, 0x101, 0x800000000000}, &(0x7f0000000140)=0x18) 23:00:39 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:40 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x8) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:40 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:40 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:40 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x4c) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x4) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:40 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:40 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:40 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:40 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000003940)='/dev/null\x00', 0x802, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000003980), &(0x7f00000039c0)=0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x3, 0x4) r2 = getpgrp(0xffffffffffffffff) move_pages(r2, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000b2d000/0x1000)=nil], &(0x7f0000000040), &(0x7f0000000100), 0x0) 23:00:40 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:41 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:41 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:43 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:43 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xa0240) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x200000, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000001640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001600)={&(0x7f0000000200)={0x13c4, 0x32, 0x400, 0x70bd28, 0x25dfdbfe, {0x17}, [@typed={0x8, 0x4a, @str='\x00'}, @nested={0x1134, 0x80, [@generic="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", @typed={0x10, 0x4f, @str='!+nodev:{.\x00'}, @generic="e167fde25d06cd4e490928742c9f08e50e59d2ef348b912f32865150b61221d136642e3216b534bd01315be8775f99d459137ce4b8b8525e9ce8a44c3df85c9efb274846ddbb70327a9965d5593975c62043291e7d6ace319d47f6eb9f3d00d26d123531329f735422bcd67c4ce9229e7f855548e0c34371fd6bb8d9ebb96f9c98d212cbbf6e611d61e87e3b6d9e", @generic="da0a1c8d0470", @typed={0x4, 0x8e}, @typed={0x14, 0x78, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="e16707624dc7cdb91294e86d2070eee53af6d38651ed6cf6e4131c8025098a4dd3a387e85067ad2c7b46e08f9295d5615c3e568d6aac0a5661b2a4120962370a247f859117236e7a08a3b58a99d65171d61f08b1337bb6f2565fe9b438b68428c7b4952ab0e0e39a4a5af091341daf2fe925d1fe"]}, @generic="dc", @typed={0xb0, 0x58, @binary="bfdd117120648e717bd2b92c356d02a41c6c91a680a8a026c38d0d5259fa35d48a65fbce8adf378baf7dccfdca970101681e99a5cee21b2498fafeb9b9b6b7317db89f8399ddaa23239a90004401075ee087f098bb39eb5bc31ff16027e2a064e1edcfd3180f1ea4a844c538c55252a9c5b6ddddea97a0de4b696b4a7a757ccce8cd5fa2615ad84427c15d9d69bb7d5f1ea3533f9ba3d359524f027ce59e1d31ec1916f6725f575ea2"}, @nested={0x28, 0x53, [@typed={0x4, 0x5b}, @typed={0x8, 0x96, @str='\x00'}, @typed={0x10, 0x79, @str='*}[selinux\x00'}, @typed={0x8, 0x87, @fd=r1}]}, @generic="ec80ed46f128f1ea117d1953d8e50b6c355aa831420fa29a386af536ca11a14111c73a87269cdcd72a1cfa720e7d8afe2d91db565c816f6173934a09275dcf6b1741acff831be7b7138af0cf0afd1431dacdb800eb149e2e90178df99615c262db76f92ce9e84e45563c25ebbf047fc91633526bf98cb8fa9e57b4f016412e9c0e7675637fbc3ef2e6c5884bf01fc9d27ebebd8e0750f2c8b60a6bdf28b6a2b8086b335b08219568188e40eb12ad6e92c8b46d636463da8acfa62f1cd17c7be46313451a14fe6d6465f018521857e0b8baee5bd23f420fbb67709022", @nested={0x40, 0x21, [@typed={0x8, 0x1e, @uid=r2}, @generic="de1f4a4e1fff8fb0ff9d51c5a2e284c11bed8f391c7272c1e14a8448b65b961bd37b067cf815cf6c64cdb0c7a0babda7e5"]}, @generic="9c3b18633911a62e4d1052e10f51d1f732c3b4b1baa30bf2ac1f42562d956318ee0389c77096255519ca2d1466af546e5188c010a02b88eabe5e0ca288ad5d25863d3494a32e9aec8d6ab1e7e3a5945f2a43562486ab662e61425f99263fcf4ecdde19db7340fa81bda6117f6a572d0b4461cd7d787744be826f81568e04bc"]}, 0x13c4}, 0x1, 0x0, 0x0, 0x40}, 0x4841) 23:00:43 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:43 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:43 executing program 5: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000380)={0x0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) clone(0x2, 0x0, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="c58775a030349e") ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$sndctrl(0x0, 0x2, 0x321002) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x430201}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:43 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:43 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 275.752833] IPVS: ftp: loaded support on port[0] = 21 23:00:44 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x20000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x8001, 0x1000, 0x4, 0xfffffffffffffff9, 0x7fff, 0x8, 0xa3f, 0x5, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @multicast1}}}, 0x84) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000240)={0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f0000000380)={r2, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=[0x565c, 0x40, 0x10000, 0x3], 0x14, 0x2, 0x1, &(0x7f0000000300)=[0x3, 0x9], &(0x7f0000000340)=[0x1, 0x700000, 0x9]}) 23:00:44 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:44 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:44 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 276.375819] chnl_net:caif_netlink_parms(): no params data found [ 276.523054] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.533935] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.614148] device bridge_slave_0 entered promiscuous mode [ 276.642552] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.649571] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.665002] device bridge_slave_1 entered promiscuous mode [ 276.711330] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 276.788915] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 276.849729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.864020] team0: Port device team_slave_0 added [ 276.878276] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.885755] team0: Port device team_slave_1 added [ 276.892578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 276.900441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 276.970708] device hsr_slave_0 entered promiscuous mode [ 276.987548] device hsr_slave_1 entered promiscuous mode [ 277.038003] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 277.046187] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 277.077270] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.083708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.090414] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.096779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.150221] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 277.156449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.166560] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 277.178086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.193762] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.202957] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.220438] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 277.239858] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 277.245956] 8021q: adding VLAN 0 to HW filter on device team0 [ 277.265963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.277758] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.284109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.294944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.302892] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.309293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.331823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.340268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.356239] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 277.366542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 277.386204] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 277.395456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 277.403549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.411496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.425578] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 277.432667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 277.446451] 8021q: adding VLAN 0 to HW filter on device batadv0 23:00:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:45 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:45 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='ns\x00') ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f00000000c0)={[], 0x1, 0x6, 0x400, 0x0, 0x8, 0x4000, 0xf001, [], 0x7}) 23:00:45 executing program 5: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000000380)={0x0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) clone(0x2, 0x0, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="c58775a030349e") ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_dev$sndctrl(0x0, 0x2, 0x321002) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x430201}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:45 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 277.501187] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 277.527085] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11323] 23:00:45 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 277.676060] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 277.776831] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11337] 23:00:46 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x4) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:46 executing program 4: syz_open_dev$video(0x0, 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:46 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 278.206574] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 278.279623] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11360] 23:00:46 executing program 4: syz_open_dev$video(0x0, 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:46 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x20200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x1, 0x80, 0x3, 0x20, r0, 0x8}, 0x2c) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:46 executing program 5: syz_open_dev$video(0x0, 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:46 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:46 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 278.605651] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 278.687598] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11375] 23:00:46 executing program 4: syz_open_dev$video(0x0, 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:47 executing program 5: syz_open_dev$video(0x0, 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x1, 0x80000000, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), 0x4) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) [ 279.016817] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 279.129521] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11395] 23:00:47 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:47 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r3, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r4 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 279.428223] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 279.513219] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11416] 23:00:47 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x500, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x200}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x8, 0x1, 0x206, 0x2, 0x4, 0x800, 0x1, 0x7, r1}, &(0x7f0000000180)=0x20) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) [ 279.639523] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:47 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:47 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 279.682929] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:47 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:47 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 279.749136] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[11426] [ 279.772192] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11430] 23:00:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 279.961568] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:48 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:48 executing program 1: open(&(0x7f0000000280)='./file0\x00', 0x84000, 0x2) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x220}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa8, r1, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @remote}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x404c001) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 280.225359] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:48 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x4) [ 280.435891] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[11473] [ 280.532534] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11477] 23:00:48 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:48 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:48 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:48 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r1 = getpgrp(0xffffffffffffffff) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x100, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x880, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000001c0)={r3, r4, 0x4}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:49 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20100, 0x0) bind$rxrpc(r1, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x24) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000240)=0x95f) r2 = geteuid() getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r0, r2, r3}, 0xc) 23:00:49 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:49 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:49 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40100, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000000, 0x8972, 0xffffffffffffffff, 0x1) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000100)=0x5) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x7, 0x7fffffff, 0x0, 0x800, 0x12}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r1, 0x80000001, 0xc7, "9e9e82bdd34ffea50ddb7cc7c7ecb3ab42bfe85f9e69bbb72d90e8a621d5079be06e9c47eee6fa399d67f5278d4ba9ee33547fbbb21a34b895501977ff8e9b680c821bbe2a811ea3061aa22f2dc32f7511652930121e23a98be4ed7885c081f8f62505490fc87055511565fe8171b5ccad184234a4781b2f29fa4b9f02c4018c7c4a9d928862e60e6fbe93d379681ff4a0645dc81614dfb7fd4134d7e72f36005a2aa1605e1a3e34b04270348cb78d4b2646a3b657a0841a49acee92a1dee8e7cbe552b114ec3b"}, 0xcf) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x2], &(0x7f0000000080), 0x0) 23:00:50 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0xffffffffffffff83) r1 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x20180) fadvise64(r1, 0x1, 0x2, 0x3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000b55000/0x2000)=nil, &(0x7f0000aa1000/0x4000)=nil, &(0x7f0000b20000/0x3000)=nil, &(0x7f0000cb0000/0x2000)=nil, &(0x7f0000be7000/0x3000)=nil, &(0x7f00009f0000/0x4000)=nil, &(0x7f0000989000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000c83000/0x2000)=nil, &(0x7f0000a52000/0x3000)=nil, &(0x7f0000bc8000/0x1000)=nil, &(0x7f0000000100)="cc8769ba88fe42f8f10bb76b7a3ceec8ea6225eeb3117cdb44abc152e4443e85cb3dc1eb2bf482409563aa7cf3fde679fac490d1a6bbdce8be77ad229f35753d043d46500ddd72e6d608ceea89b1eda0764530fd97751f6dde7d7e1ba1d12c83da4662177bd6b4e3f8a545351515e495f12b344b", 0x74, r1}, 0x68) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x0) 23:00:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:50 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:50 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x0, 0x1, [{r0, 0x0, 0x1000, 0xfffffffffffff000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:50 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:50 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x4001) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000000c0)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000140)={0x3, 0x7ffb}) readahead(r0, 0x4, 0xca) ioctl$VIDIOC_DQEVENT(r0, 0x80785659, &(0x7f0000000180)={0x0, @src_change}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:50 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 282.713904] net_ratelimit: 12 callbacks suppressed [ 282.713944] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 282.756446] __report_access: 8 callbacks suppressed [ 282.756459] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11600] [ 282.772242] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 282.774008] ptrace attach of "/root/syz-executor5"[8103] was attempted by "/root/syz-executor5"[11602] 23:00:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0xe21cd5f4a68c11e2, 0x0) bind$tipc(r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8e400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000040)={0x5, 0x2, {0xffffffffffffffff, 0x0, 0x4af, 0x3, 0x1e01}}) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000e71000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) 23:00:51 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 282.900624] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 282.985372] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[11609] [ 283.100033] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:51 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80807, 0x5ad) socket$caif_stream(0x25, 0x1, 0x4) r1 = perf_event_open$cgroup(&(0x7f0000000200)={0x7, 0x70, 0x0, 0x9, 0x5, 0x7f, 0x0, 0x9, 0x10802, 0x5, 0x8, 0x80000001, 0x81, 0x4, 0x4, 0x5, 0x5, 0x1, 0x4, 0x2, 0x1, 0x8f, 0x200, 0x7f8000000, 0x3, 0xb31, 0x9, 0x2, 0xffffffffffffff81, 0x9, 0x4, 0x7, 0x6, 0x3, 0x80d, 0x7, 0xffffffffffffff00, 0x5, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x1, 0x7fffffff, 0x10001, 0x0, 0x1, 0x1, 0x1}, 0xffffffffffffff9c, 0x7, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc5b) r2 = getpgrp(0xffffffffffffffff) move_pages(r2, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f00000001c0)=[0x1], &(0x7f0000000080), 0x2) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4080, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@deltclass={0x54, 0x29, 0x100, 0x70bd2c, 0x25dfdbfd, {0x0, r4, {0xffe0, 0xf}, {0x7}, {0x1b, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x0, 0x8000}}, @TCA_RATE={0x8, 0x5, {0x2f00, 0x6}}, @TCA_RATE={0x8, 0x5, {0x1, 0x80}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_MASK={0x8, 0x4, 0x6e2c}}}]}, 0x54}}, 0x0) 23:00:51 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:51 executing program 2: getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r2, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) fstat(r1, 0x0) r3 = dup(r2) write$P9_RCLUNK(r3, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="000125bd7000fbdbdf25100000001c000200080005007f008000080009000700000008000500040000000800060052c4ffff080005000000000064000200080003000000000014000100fe880000000000bbed0001080009000104000008000300020000000800090004020000000004000200000014000100fe80000000000000000000800000001e08000900ad0800000800070000000000080005006203000008000400080000000800050001040000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000000)=0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x4, 0x0, 0x100, 0x0, 0x401, 0x0, 0x3, 0xfffffffffffffdfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x2, 0xffffffffffffff9c, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r6, 0x0) [ 283.212543] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11620] 23:00:51 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:51 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:51 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f00000000c0)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x100000001, 0x0) ftruncate(r0, 0x6) 23:00:51 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 283.809663] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 283.867423] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11652] 23:00:52 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:52 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6ca5, 0xc40) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000000c0)={0x7, 0x1, @start={0x6, 0x1}}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x1010, r0, 0xfffffffffffffffd) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:52 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 284.075851] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:52 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 284.129174] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11669] 23:00:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:52 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10102, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @loopback}, {0x1, @remote}, 0x60, {0x2, 0x4e22, @rand_addr=0xffff}, 'eql\x00'}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e23, 0x7, @rand_addr="0746bd763da6e452fc977f2b7d1f1d7c", 0x9}}}, 0x84) 23:00:52 executing program 2: getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x2000000001, 0x0) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffe97) setsockopt$inet_mreqsrc(r2, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) fstat(r1, 0x0) r3 = dup(r2) write$P9_RCLUNK(r3, &(0x7f0000000040)={0xfffffffffffffee5, 0x79, 0xe803}, 0xffffffffffffffc4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x5298391e, 0x4}) mmap(&(0x7f0000011000/0x6000)=nil, 0x6000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="000125bd7000fbdbdf25100000001c000200080005007f008000080009000700000008000500040000000800060052c4ffff080005000000000064000200080003000000000014000100fe880000000000bbed0001080009000104000008000300020000000800090004020000000004000200000014000100fe80000000000000000000800000001e08000900ad0800000800070000000000080005006203000008000400080000000800050001040000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000000)=0x1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x4, 0x0, 0x100, 0x0, 0x401, 0x0, 0x3, 0xfffffffffffffdfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x2, 0xffffffffffffff9c, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r6, 0x0) 23:00:52 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 284.545760] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 284.620020] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11689] 23:00:53 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x200, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000001c0), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x800, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) 23:00:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:53 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:53 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 285.072722] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 285.131588] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11718] 23:00:53 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:53 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:53 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:53 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x100, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000e4e1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x693b}, 0xc) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000180)={0xee95, 0xfff, 0x8, 0x0, 0x3, 0xfffffffffffffff7, 0xe8d, 0x4, 0xffffffff7fffffff, 0x790}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0x5b, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000200)=""/91}, &(0x7f0000000300)=0x50) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:53 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 285.514478] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:53 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:53 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 285.793586] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 285.877841] ptrace attach of "/root/syz-executor3"[11286] was attempted by ""[11749] 23:00:54 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x21, 0x40) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x100], &(0x7f0000000080), 0x0) 23:00:54 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 286.074387] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11765] 23:00:54 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r0, 0x5}, &(0x7f00000000c0)=0x8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r1, 0x5608) sendmsg$nl_generic(r4, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r5 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r6, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:54 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:54 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/softnet_stat\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000000c0)={0xa, 0x5, 0x7, 0x800}, 0xa) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000100)={0x7, 0x2, @start={0x4, 0x1}}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:54 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:54 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:54 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:54 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) read$alg(r0, &(0x7f00000000c0)=""/106, 0x6a) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000140), 0x4) 23:00:54 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:55 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:55 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, 0x0, &(0x7f0000000080)) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:55 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:55 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:55 executing program 1: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0xe0800) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, r0, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101080) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x1, 0x4]) 23:00:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:55 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/199) 23:00:55 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:55 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:55 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:56 executing program 5: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:56 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:56 executing program 1: mmap(&(0x7f0000cea000/0x2000)=nil, 0x2000, 0x2000000, 0x400000000008972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:56 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 287.861869] net_ratelimit: 7 callbacks suppressed [ 287.861938] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:56 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:56 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x111540, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{0x7f, 0x80000001, 0x33e, 0x12000000000}, 'syz1\x00', 0x25}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) [ 288.000850] __report_access: 5 callbacks suppressed [ 288.000903] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11866] 23:00:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:56 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:56 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 288.383168] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:56 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x16, 0x5, 0x1f, "5c409f0df77075035e41200dddde975f", "fa"}, 0x16, 0x3) dup(r2) fanotify_init(0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000002080)=""/4096) r3 = socket$inet(0x2b, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x8}, 0x1c) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000940)={'filter\x00'}, &(0x7f0000000600)=0x44) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) write$binfmt_script(r3, &(0x7f0000001440)=ANY=[@ANYBLOB="2321202e2f66696c653020746c7300206f766600200a6daf7d33dfaf114fc5dddb60b31e8638b43dd3e7faa4c1a09f818743779f03e0adc5c642bda7b4b3b3faae249cfdcdbaa5d2ecf36fe6f1b82ee6618766df3560994bbeb841d543c8165d760c31b7f215855a3372b1f011982aa3e5a6c87f981187c70fb0e3354eff543e2b885cd0d6f0d69291bca536ef1fac632d129afd2869283f18dc78ef2c632c5c594ad5d17229002aa81968a1ad611527a48fa0c897b44dc0ef1535499c363e112ed4df07963fde19e7361dbe56a31a651a9f2319f2f65c922fe54e10cce2cc4ff6552519b365c055cfcaa178bfc18e1ad058a62ed0be462dd7fb3a5740591a5a5609e197e4e36eeda3ebfd95bc45f7064ec138f8867bd2546027391c51a226a769d5d1b7596d06b0e933cd8b8d183f64174335652c6b34676cf0543a376fffa5cabfb1f239cb490c295c0fec1bbb82a852610431b4acba283ede3171b7fa1beb6b620c474e6f6cf1dc839e59b35c80d08e2ec30014c50817b4325462177b37c73fdfafb01392553b3be52585fb958e6f1f238966217c077370fdc173a95b255be3332182b6bb18f26a30516a5ac967348481a79ef74dec9a46074388520e5f8346d39173fdbf96ca6e4076e8f527de6bbfe9cd5b4460743ca510ddf19dd91f2b58954571439c76145ef6ee5cced7b157c1de52946830e29f61e65c72f22d05a8703448d88c55d5f42b9073e749abceb64c3763b33529f18ac8479e26922c501df42dad1615ba98da97e65c0be0648284f0cb9017249f73cc4834a9101e4f769a40ec6aceaf0c9d7c2abdf8e352277741bb5cc81e29d09aae8950f7f2a5cecc1b3c95623f68d82bc9915229af1020db0a76f744c087bb1fea24bb32afa978395b30424c4a38c903dcffaed71503b6fcbe0bb67eb291c1571c7df88dda38af903c94bb205621a74ff366dfe3b22cd74186e3491357e35006d7aaab0594327126dd40b63899b37da71f0cf7f754217db144290e5329858486a67b5176c5e74a650af41cbaa44b1af306f94a46cc11493d4c3df3926ddb6cdc8ef0d7e51abffb330ba197b0c4bd695b8ab8c98709d30854aa3711fddf8cda16c40960d9101d87bcfd8b2b3ffaf21442d8c0e605f5c9ad916abc1846a00c713174bfe6f728eeacb379da16e4447de5f54397e9ad69d1ad6a47f3e71a3b8df63a74776514393c6d82cd4a9df4ac0198bd3e9a86e5b3389dd51add758ee9ba3a2d8bf0cb6e7a5236c744e048ae9e2d8d6b091ef146bfc8e8dd509f65a778b56d3070cd53e80e85025cc77ebca8b87edacd81788de5a996bb57e39d98ecd503dbee8dd297519aad47e9ef9161c7500000107f40195e52ae211e2b053001cc5db36bcca40893"], 0x3c6) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r3, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001180)=ANY=[], &(0x7f00000004c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) recvmmsg(r3, &(0x7f0000000f00)=[{{&(0x7f0000000500)=@pppol2tpv3, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/255, 0xff}, {&(0x7f00000008c0)=""/108, 0x6c}], 0x4}}, {{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x2, 0x100, &(0x7f0000001000)={0x77359400}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e20, @multicast1}}, 0x4, 0x2, 0x0, "0a3606219664b27d9d2a733f819794316c01a594921338342eaad9b368ae2a43b1f836969039223ff7e2b0dbb2496201de0be58e53247558d1867a41b6ee0eecbd4bc371bf97909b2b4aae2dc0498eb0"}, 0xd8) ftruncate(0xffffffffffffffff, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 23:00:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 288.485271] ptrace attach of ""[11286] was attempted by ""[11890] 23:00:56 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 288.689584] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:56 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 288.735645] tls_set_device_offload_rx: netdev lo with no TLS offload [ 288.775176] ptrace attach of ""[11286] was attempted by ""[11905] 23:00:57 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:57 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 288.917980] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:57 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 289.002150] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11921] 23:00:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:57 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x200003, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000140)={{0x2, @addr=0x1}, 0x8, 0x1, 0x2}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000000080)="19bbc14284a3b97b2842d03a5ae1b7086fa6590d10e8ca4f0a4da99754ec1d202c3cbd5956d568", 0x27}, {&(0x7f00000001c0)="cdccf58ae85b77e30d48f1a6da7c7949a0520a1e48bf31cceaa6d1fffb32548c457945ecc02d5c2a9f3debcd815bb340664d30e1a3355736d3c775a6962313a946397a378df7d1208dc240a67d92b4f93aebd49ae99775f5179072efe0c24e369e2b7a9c93895f655f62dbc47358c9af1b8e4d81bd3b0b4a0b3469e81b62ace3e7eaf213efcd404460e2779f45e89c498d2b110c518f74f1e3e973f3452eaf7624719bccb7c060a848e635c73120ebb315d0f8ed14", 0xb5}, {&(0x7f0000000280)="08ee015a2979e494e9b381aed84c44910a67432a85d80d2280660ea03f88cb41f4171b8cebf1f40f1ffc20205e9b807477dd178bcbe6ab0fae82411c5e807173bec7e74784c94ea1453d2da7c2e29cac5d7094b1085be0296567df7d11042866dc0442ad6778e36f635556ad8756c8f930daee1cec4348e05cec343b59e613c42cb73d809a565e98aa53856fe82765df5c0e08beaf73e12363254d6d9f98306f8d9192aec66b9a17329907ac27865cd2640cc53075154f32f54f246e8110c747cb8c56965a8680d883b674a541bcf46efae39244cd94c373d6d8996f02a6632bb285886848762fc3518e18e65acbf4cca823", 0xf2}, {&(0x7f0000000380)="db92c5d0219fc991dcb4b67d17296ec9cb17d050bae0782d2ecc11a0290d2c60597bb1f29c1e4d52e0e05989b0c0a076813cbd259f624341c8b13c5d68d7b757c1ffd84165f4935d7ec088763747733d2564d191126550cc817cd2e4bd7737e8b5", 0x61}, {&(0x7f0000000400)='r;', 0x2}], 0x5, 0x0) 23:00:57 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:57 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 289.257419] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 289.292357] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11944] 23:00:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:57 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:57 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:57 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) [ 289.535851] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 289.599257] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11957] 23:00:57 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:58 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 289.953293] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:58 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:58 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)=')ppp1securitynodevppp1keyring\'%\x00', 0xffffffffffffffff}, 0x30) move_pages(r0, 0x6, &(0x7f0000000100)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00009ae000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000b47000/0x1000)=nil, &(0x7f0000c24000/0x4000)=nil], &(0x7f0000000140)=[0x3, 0xbe, 0x8, 0xff], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x2) [ 289.999231] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[11982] 23:00:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 290.257930] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:00:58 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 290.313712] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12001] [ 290.331499] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 290.418138] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12006] 23:00:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0xb, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x40, 0x7fffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000c1a000/0x4000)=nil, 0x4000, 0x80000002, 0x8972, r2, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) getgroups(0x3, &(0x7f0000000100)=[0x0, 0xee01, 0x0]) getgroups(0x5, &(0x7f0000000180)=[0xffffffffffffffff, 0xee01, 0xee01, 0xee01, 0xffffffffffffffff]) fstat(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000003c0)=[0xee00, 0xee00]) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) getgroups(0x7, &(0x7f0000000480)=[r4, r5, r6, r7, r8, r9, r10]) 23:00:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 290.495496] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 290.534883] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12017] 23:00:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:58 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000100)="ea40a6345183226653f804abaafe81e07695cbaea3661ec236f42e50a6723aab24803e40784fd63e2f399c4904a12ffabdaebe9743558281a2f2719514a203b6d24f88daa12418224a888750e3078015b940421a380c9f6fee3523476bffe9d2437c5ba9a773bbd84ee0be5281133a3454b2b47dbfd7c6c569987cb7d61c57011d067ec78262b8b80fbdf778cb0944e8a6c3880874a4209819c845abf8293382022da88a9c15afcf1278fa2c7d3d3398d174f43249a8a85d5ca81451b8c624ff33", 0xc1, 0xfffffffffffffffa) keyctl$revoke(0x3, r0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:00:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b2991") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:59 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b2991") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000300)) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10400, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x1ff, 0x8}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r2}, 0x8) flistxattr(r1, &(0x7f0000000400), 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f00000003c0)={0x0, 0x1, [0x8, 0x7, 0x5, 0x8, 0x8001, 0x7, 0x5, 0x7]}) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x0, 0x1, 0x0, "8abfe1b8bd8c37a00eeb0d8ac3c6b450ccbb5e581b75a4beca0699d158d6717a4eb494a263b103baaefe03c5f8f4fade2f86c63ad6fbd3baefcd3225d07edfbb063ea7db211a5b23e2ad5229e48f42bc"}, 0xd8) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0245629, &(0x7f0000000380)={0x0, 0x27, 0x7d4c, [], &(0x7f0000000340)=0xffffffff}) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000a8c000/0x1000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000400)={r2, 0x7, 0x20, 0xff, 0x5f}, &(0x7f0000000440)=0x18) 23:00:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b2991") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a26026704") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b2991") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:59 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:00:59 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x16, 0x5, 0x1f, "5c409f0df77075035e41200dddde975f", "fa"}, 0x16, 0x3) dup(r2) fanotify_init(0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000002080)=""/4096) r3 = socket$inet(0x2b, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x8}, 0x1c) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000940)={'filter\x00'}, &(0x7f0000000600)=0x44) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) write$binfmt_script(r3, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x3c6) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r3, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001180)=ANY=[], &(0x7f00000004c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) recvmmsg(r3, &(0x7f0000000f00)=[{{&(0x7f0000000500)=@pppol2tpv3, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/78, 0x4e}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/255, 0xff}, {&(0x7f00000008c0)=""/108, 0x6c}], 0x4}}, {{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x2, 0x100, &(0x7f0000001000)={0x77359400}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e20, @multicast1}}, 0x4, 0x2, 0x0, "0a3606219664b27d9d2a733f819794316c01a594921338342eaad9b368ae2a43b1f836969039223ff7e2b0dbb2496201de0be58e53247558d1867a41b6ee0eecbd4bc371bf97909b2b4aae2dc0498eb0"}, 0xd8) ftruncate(0xffffffffffffffff, 0x0) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 23:00:59 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:00:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a26026704") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:00:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="c4602700000001f6b26d280000000800", 0xffffffffffffff64) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:01:00 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 291.869699] tls_set_device_offload_rx: netdev lo with no TLS offload 23:01:00 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a26026704") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a26026704") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200300, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/95) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:01:00 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d720194") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d720194") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 23:01:00 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d720194") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:01 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 292.910492] net_ratelimit: 21 callbacks suppressed [ 292.910534] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 292.979331] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:01:01 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 293.033632] __report_access: 20 callbacks suppressed [ 293.033646] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12197] 23:01:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 1: move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) rmdir(&(0x7f0000000080)='\x00') 23:01:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:01 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/cachefiles\x00', 0x30002, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e05411, &(0x7f00000000c0)=""/4096) 23:01:01 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 293.245485] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 293.290583] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 293.352568] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12212] [ 293.355528] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12209] 23:01:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac67") getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 5: getpgid(0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0x7fffffff, 0xb3, 0x800, 0x5, 0x0, 0x101, 0x0, 0xa, 0xfff, 0x600000, 0x2, 0x8000, 0x0, 0x7, 0x5, 0x3, 0xdf, 0x0, 0x0, 0x0, 0x81, 0xa6, 0xdf3, 0x5, 0x9, 0xa2, 0x5, 0x4, 0x2799, 0x0, 0xfff, 0x9, 0x2, 0x0, 0x1, 0x6, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7aace71b}, 0x404, 0x4, 0x2, 0x7, 0x8, 0x1000, 0x6}, r1, 0x0, r1, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0xfffffffffffffda2) listen(r2, 0x20000003) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r2, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) recvmmsg(r4, &(0x7f0000003700)=[{{0x0, 0x0, &(0x7f0000001f00)}}], 0x1, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) 23:01:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:01 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000100), 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$void(r0, 0xc0045878) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x1) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f00000000c0)={0x1000}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000100)={0x3, {0x0, 0xffffffff00000000, 0x8, 0x3ff}, {0x8, 0x0, 0x7fffffff, 0x6}, {0x2}}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x4, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="8c0000005d08ea3c18377c1c5a0f61027d64c204344b1b31e52fe5f6370d5bfada4458a858dd13ba1f7d5ed1832b9e89f7a25a10030cc13760288ca6cf4836fff3103b46c314afa7591dbf1e027a6ce2070c4442b8c4fc009aa0fafb294ed939504e8c46c2cd43c2d0e02e68f592b24bacbdb2438327cba9081d9e1992c7ae10da686ef23ccccff82047aa5227dd8d03"], &(0x7f0000000340)=0x94) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xd8) [ 293.583457] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:01:01 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:01 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 293.670060] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12235] 23:01:01 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = getpid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e22}, 0x6e) capset(&(0x7f0000000080)={0x20080522, r0}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x1410000, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000001fc0)) close(r1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) syz_open_procfs(r0, &(0x7f0000000480)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) [ 293.791091] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 293.856141] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12248] 23:01:02 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:02 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = getpid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e22}, 0x6e) capset(&(0x7f0000000080)={0x20080522, r0}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000100)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x1410000, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000001fc0)) close(r1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) syz_open_procfs(r0, &(0x7f0000000480)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, &(0x7f000033bffc)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 23:01:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:02 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') io_setup(0x180000000000, &(0x7f0000000100)=0x0) io_submit(r2, 0x8, &(0x7f00000008c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x101, r0, &(0x7f0000000240)="6dc2fc2f1787a861db6689928741766093833b323616c7a1d5cc141b0def179c8c9040c6160e956a8992f1f0e1e61fad70e306d094", 0x35, 0x1000, 0x0, 0x3, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x8077, r0, &(0x7f00000002c0)="2ae8c9eb189ab3657ab5611834fc7423baab32c3b655f5f65bbea207543dea67df628d7febb3875a479274922b0688216da120d8e10a4ace081cd29b68bb21e3eb47ba77cb18af", 0x47, 0x63, 0x0, 0x2, r0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x3, 0x7f, r0, &(0x7f00000003c0)="aa14d43247edf2b6b00464f63569faa12cd351db1deee27ffd5d763bc92edecfcb324fbe718ec46d930b64f2ee9fccd96d2d4e81f72cd715f6d57edbc50ec06b518278df443b339aec2f48a790689d4187c0e08675958606f059c5a1ff1d7bde8d471ad3630d2c3ca7b4be60d28c8350015dd2aa1a30ec0eafffe89a1958eb1315d60d6f250b9cc6b60a6d86b3eedaad1f28ca3daa4817dc2f9686", 0x9b, 0x2, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000004c0)="5b688dced0af6f654d429501653776f5bff9d35bb69309af1653008045cc39048c11c6185ce3722a6255527d97cffff168f07cb37a2152675f039c866da95c9aca00c83e68a6808d9ca4", 0x4a, 0x841, 0x0, 0x2, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000000580)="be46478eb4c57695d478cec30094c9765fb8b51ec9f1adfabb73de98c8415c9ec4e72d84242aa7ce84985bb895df8a995089a168c3851afd23a8054043adce1878c063f810397221a3307104e21f61a7fea8803b5924417a66c269f7aaa5327a63f4dd21e76957a9ff17bd9012d5d75040da49b01df134c88aa5a434db9f1ea6f6192f320b34412196d24f310cd9c8460b6783d79fdd8f9e102bd9764a1a62c774bb7c3ebef7dda873666bb389def3a83f02ccf495473fe75c4540cf5ce32322f3a3a56c28f7459555d4d582a9b22a9d122c406a184b347aa6", 0xd9, 0x2, 0x0, 0x3, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f00000006c0)="fa010b7473c210b989227e3a571263ae77283238f0be2178be13a76371c10b95dcf5773d8c9338f561eeb689a841962e0ee115aa8cf62f80b3e220ce3e7b01cc864e6e45e3ee8f86f29b09f0596bd94196e8c0400a445342ee42c7dc6bc1df15bf3672762ac59aec484c14c75190fc5eef400da07ab05628039e8d39ecd0884452f12afe051ff8d043e6f1a4b2154eff3b2a3accf8e347f536aa11987c5bf5fadf7b6db48e87a6def30727a13a62482a5cc6", 0xb2, 0x30, 0x0, 0x0, r0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x1ff, r0, &(0x7f00000007c0)="078e58ac8b79a9ceea7ba39782ec411872c6a15bd8210590a90507eb20f1d6c12c23412c57", 0x25, 0x1, 0x0, 0x3, r0}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000840)="103acfeeb83fe3242ac7d30ba462521373f656e2a6", 0x15, 0x101, 0x0, 0x2, r0}]) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r1, 0x210, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x11}, 0x4008001) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) 23:01:02 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:02 executing program 5: getpgid(0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = memfd_create(&(0x7f0000000140)='cgroup2\x00u\xb56\xe0\x8f\x97\xe1\fB\x89\xe2\x96F/<\x8f\xc6\xa4\x18\"\x80\'\xbfMu\x93\x1e#\x8bA\xcfU\xaf\xcf}\xd2(Eg\xedZs\x8f3\x82\xaa\xe64\x9e\x103j\xdfhd\x99\xeb\x1d\x93y\xeb(', 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0x7fffffff, 0xb3, 0x800, 0x5, 0x0, 0x101, 0x0, 0xa, 0xfff, 0x600000, 0x2, 0x8000, 0x0, 0x7, 0x5, 0x3, 0xdf, 0x0, 0x0, 0x0, 0x81, 0xa6, 0xdf3, 0x5, 0x9, 0xa2, 0x5, 0x4, 0x2799, 0x0, 0xfff, 0x9, 0x2, 0x0, 0x1, 0x6, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x7aace71b}, 0x404, 0x4, 0x2, 0x7, 0x8, 0x1000, 0x6}, r1, 0x0, r1, 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0xfffffffffffffda2) listen(r2, 0x20000003) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r2, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) recvmmsg(r4, &(0x7f0000003700)=[{{0x0, 0x0, &(0x7f0000001f00)}}], 0x1, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) [ 294.242512] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:01:02 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 294.313215] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12282] [ 294.482864] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 294.491557] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 294.513303] ptrace attach of "/root/syz-executor3"[11286] was attempted by "/root/syz-executor3"[12304] 23:01:02 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:02 executing program 1: move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@mcast2, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'syzkaller1\x00', 0x0}) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000001a00)=[{{&(0x7f0000001740)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000017c0)=""/55, 0x37}, {&(0x7f0000001800)=""/187, 0xbb}, {&(0x7f00000018c0)=""/198, 0xc6}], 0x3}, 0x5}], 0x1, 0x40000000, &(0x7f0000001a40)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000001a80)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000001ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001b00)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000002240)={@dev, 0x0}, &(0x7f0000002280)=0x14) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000380), 0x4) getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000023c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @initdev, @dev}, &(0x7f0000000c00)=0xfffffff6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000037c0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003d80)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000003e80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000003ec0)={@remote, 0x0}, &(0x7f0000003f00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003f40)={0x0, @initdev, @local}, &(0x7f0000003f80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000006900)={&(0x7f0000005400)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000067c0)=[{&(0x7f0000005480)=""/4096, 0x1000}, {&(0x7f0000006480)=""/186, 0xba}, {&(0x7f0000006540)=""/231, 0xe7}, {&(0x7f0000006640)=""/102, 0x66}, {&(0x7f00000066c0)=""/78, 0x4e}, {&(0x7f0000006740)=""/123, 0x7b}], 0x6, &(0x7f0000006800)=""/215, 0xd7}, 0x10000) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000007080)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000007040)={&(0x7f0000000440)=ANY=[@ANYBLOB="e8060000", @ANYRES16=r1, @ANYBLOB="020327bd7000fedbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="9c01020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000300000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="080007000000000008000100", @ANYRES32=r5, @ANYBLOB="280102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100008038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000300000008000100", @ANYRES32=r9, @ANYBLOB="400002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r10, @ANYBLOB="d40102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="480102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040080000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004003600000008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r15, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="84000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004006500000008000600", @ANYRES32=r18, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400010100000800070000000000"], 0x6e8}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) [ 294.653734] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12299] 23:01:02 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:02 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x200000) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x7fffffff) 23:01:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 294.941256] openvswitch: netlink: Either Ethernet header or EtherType is required. 23:01:03 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200100, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000040)) 23:01:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1cc") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) [ 295.030919] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12328] 23:01:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x101802, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000004c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000500)=0xc) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) sendmsg$nl_xfrm(r2, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=@delpolicy={0x70, 0x14, 0x700, 0x70bd25, 0x25dfdbfb, {{@in6=@dev={0xfe, 0x80, [], 0x28}, @in=@multicast1, 0x4e20, 0xfffffffffffffffb, 0x4e22, 0x9, 0xa, 0x80, 0x20, 0x0, r3, r4}, 0x6e6bb9}, [@lastused={0xc, 0xf, 0x5}, @proto={0x8, 0x19, 0x2b}, @offload={0xc, 0x1c, {r5, 0x1}}]}, 0x70}}, 0x24000055) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@rand_addr="46219d43d72c3b89262fe574619da8a2", 0x10000, 0x1, 0xff, 0xe, 0x2, 0x10000000000025}, &(0x7f0000000440)=0x20) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x8, 0x8, 0xffff, 0x9, 0xb, 0x2, 0xfffffffffffffff9, 0x18, 0x41}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000880)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000200)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10040024}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="3400000068eeed957e1a", @ANYRES16=r6, @ANYBLOB="08002bbd7000ffdbdf250c0000000c00030008000400060000001400010008000800000000000800010000000000"], 0x34}}, 0x4c000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x40, r1, 0x0, 0x0, 0x6, 0x0, 0x2, r2}, &(0x7f0000000340)) dup(r1) 23:01:03 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:03 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 295.258618] ptrace attach of "/root/syz-executor2"[8091] was attempted by "/root/syz-executor2"[12333] 23:01:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x1c0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8142, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cgroup.stat\x05', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004fc0)={0x0, @local, @broadcast}, &(0x7f0000005000)=0xc) sendmsg$xdp(r2, &(0x7f0000006440)={&(0x7f0000005040)={0x2c, 0x6, r3, 0x1}, 0x10, &(0x7f0000006400)=[{&(0x7f0000005080)="cfbe5b396fb6a0c9d4ebe7645ab65e56cd543e229314314bdcc5b5e9f0133a7acc54dff3cf5b8e5dbd5980c48ccbd8731db1599cc48dba2fb58825199be152edbb208bee413d366b96c33242d06650f9baafffd35969c222426f77a1dc98e39fe2d4c097c46abc3f6b2de873e97580df", 0x70}, {&(0x7f0000005100)="8348884cb7139dd4bac62ee2cd0c6ca8444b04a2a672d8285256c8bb06e03a0bec04c4d64506b30f5ca40c579dbd106ac2cbcab8107dc83a76fcef3f71dba2ddc566c1716f830aec395b356596e2d6694e0378a98ee3beccb1cbbd054658ae4b6892f982e63b6392046d12f72bb76e1670c6b00d48919082082da911c63cff94966f1c42becccb010a33bb9a8396c57c88ab590fe65b094e6fbb5b56", 0x9c}, {&(0x7f00000051c0)="f7fae5486eff8dee957e77803dd6374a4ecf621d761484677b4570488d7a8d91e332edd1e7039765362c56aa60d831bc788b10264fdfc6ebe5e67a99a282650f9ccd4b95eb78355d4043c6cc6db27cc58c0de5aff091f9efdcb29c00df9977fe7371ada335bda3629a8eef4589d29622aef5854fbe03e68ba537ea279d784aa3518f56a6010baa302ae53955525e04784c754fdbee05703223780928c75df61307c7167869a00e0bab7649242ad9d97624916d69e30d3177ee08d1692726518ce6bcc55b66f7", 0xc6}, {&(0x7f00000052c0)="f557b9f23d0270a4f56efc72017495a5c2ac2396668dbbeae423f7b4d4ca11f2ef30666178d2eefbf340cf331320eadf41a2d66c2977ad24ceaa330a2ae90923e55439f6dc51bbe0a5c11313c767383361703e79ea2a09aba8a1f8267e40a61137ca6776bc97e68fd017af046f50cb59de526a0a95212a338dcadd14a5b950a1ced165097240c0490c83eb5ec0631dc19bfa24233a06bbe7202117fbcd56afd8ccc6d77baced57f143cc3b00f2162326265ac7b8a783f0bf7282407e738c0ba440193c155999d59193cc8d1298cedd73fa4b894e0d0d034ba5df", 0xda}, {&(0x7f00000053c0)="74e8d4ff10ecc8aa32b6abcc32d2b7d4cdf67e94ebc904062476fa6c1aba20f6ab0631b536b3363492f9d031c06702d9cf", 0x31}, {&(0x7f0000005400)="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", 0x1000}], 0x6, 0x0, 0x0, 0x80}, 0x80) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000008061f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 23:01:03 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'team0\x00', {0x2, 0x4e23, @loopback}}) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f0000000140)=0x4, 0x4) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000180)=""/3, &(0x7f00000001c0)=0x3) 23:01:03 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) [ 295.564049] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 295.612643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 23:01:05 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getgroups(0x1, &(0x7f0000000200)=[0x0]) lchown(&(0x7f0000000080)='./file0\x00', r0, r1) r2 = getpid() move_pages(r2, 0x2, &(0x7f0000000240)=[&(0x7f0000c3b000/0x2000)=nil, &(0x7f0000c66000/0x1000)=nil], 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 23:01:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000600)="7a0e030692fbae81f941dc558ffc4b63bf9b08b4769f48ad89b4a3ebe3966f42c2c92871d2e4d596ad32727ab40a8914b687239a5fbf0acd915a9d21d0dbfdfc3e3308000000982eb090cc143512b49ee6894dc7347f529534f96e9bf48651828b81629f5ee6dadbb5250b6cc1017a84ce7a5b6062d7de7e7821595906a3950bad80f837ac891b29912dfb665347e3f8de104141845c5ee39cb9ab3a260267045afc3f1bd08cbe8d7201948c33d542d6ad9ef1ccac") getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x10000}}, [0x8, 0x7, 0xbea80000, 0x1, 0x4, 0x3, 0x7fffffff, 0x18000000, 0x7a, 0xfffffffffffff001, 0x4, 0x9000000000000000, 0xffffffffffff9b3d, 0x3ff, 0x5]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000000c0)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pread64(r0, &(0x7f0000000400)=""/191, 0xbf, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000004c0)=0x2000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000380)) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x200040c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000040)=ANY=[]) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VT_DISALLOCATE(r2, 0x5608) sendmsg$nl_generic(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@nested={0x8, 0x0, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) r6 = socket(0x8, 0x4, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x4, 0xffffffffffff0cb7, 0x5, 0xfff}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, 0x0, &(0x7f00000003c0)) fcntl$getownex(r7, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x106c}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) 23:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) rt_sigaction(0x1e, &(0x7f0000000080)={&(0x7f0000000000)="dda41600000080670f5c7c0067c808007c8fc828a6effac4e2792a96aaf1f9960f31dc750ac4e3b56e553b54660f76d3660f0fa9b20800009e", {0x9}, 0x80000000, &(0x7f0000000040)="c4e155dc233ef018a2e00000000f0d964cee31fc0f446100c4e27d192b6564de911b000000813c2a8390ffffc4e115e401c4e1ff7039130febd7"}, &(0x7f0000000140)={&(0x7f00000000c0)="8d443524c4c27d0e347236817b04771ad0ef0fae6600dcedc4c1f82e06c4e3c1480d4268000000660fde8cea000000003edbd5660ff86500", {}, 0x0, &(0x7f0000000100)="260ff358a33500f00000c4e1f8ae1500000000662ef380c5093636f2e00bc4c2d18c31c4e2c107222e810aec000000c4e1b05fd6640fe4ce"}, 0x8, &(0x7f0000000180)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x7ffff, 'veth1_to_team\x00'}}]}]}, 0x30}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x3) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000280)={0x3, {0x3f0000, 0x7ff, 0x2}}) 23:01:05 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) 23:01:05 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x101802, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000004c0)={@broadcast, @broadcast, 0x0}, &(0x7f0000000500)=0xc) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) sendmsg$nl_xfrm(r2, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=@delpolicy={0x70, 0x14, 0x700, 0x70bd25, 0x25dfdbfb, {{@in6=@dev={0xfe, 0x80, [], 0x28}, @in=@multicast1, 0x4e20, 0xfffffffffffffffb, 0x4e22, 0x9, 0xa, 0x80, 0x20, 0x0, r3, r4}, 0x6e6bb9}, [@lastused={0xc, 0xf, 0x5}, @proto={0x8, 0x19, 0x2b}, @offload={0xc, 0x1c, {r5, 0x1}}]}, 0x70}}, 0x24000055) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000400)={@rand_addr="46219d43d72c3b89262fe574619da8a2", 0x10000, 0x1, 0xff, 0xe, 0x2, 0x10000000000025}, &(0x7f0000000440)=0x20) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f00000001c0)={0x8, 0x8, 0xffff, 0x9, 0xb, 0x2, 0xfffffffffffffff9, 0x18, 0x41}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000880)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000200)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10040024}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="3400000068eeed957e1a", @ANYRES16=r6, @ANYBLOB="08002bbd7000ffdbdf250c0000000c00030008000400060000001400010008000800000000000800010000000000"], 0x34}}, 0x4c000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x40, r1, 0x0, 0x0, 0x6, 0x0, 0x2, r2}, &(0x7f0000000340)) dup(r1) 23:01:05 executing program 2: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) r2 = dup2(r0, r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r2, 0x6, 0x6}, 0xffffffffffffff43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:01:05 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:05 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x3, &(0x7f0000000000)=[&(0x7f0000a1b000/0x3000)=nil, &(0x7f0000c70000/0x2000)=nil, &(0x7f0000bca000/0x4000)=nil], &(0x7f0000000040)=[0x1], &(0x7f0000000080), 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f0000000080)=0x8, 0x4) 23:01:06 executing program 2: r0 = memfd_create(0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$EVIOCGBITKEY(r1, 0x80404521, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) fchmodat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) mount(&(0x7f0000000340)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000480)='./file0/../file0\x00', &(0x7f0000000640)='anon_inodefs\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./control\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000000000000e7200000"], 0x1, 0x0) mkdir(&(0x7f0000000040)='./control/file0\x00', 0x0) rmdir(&(0x7f0000000180)='./control/file0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) clone(0x802102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x414002) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 297.982591] IPVS: ftp: loaded support on port[0] = 21 23:01:06 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) mkdir(0x0, 0xffffffffffffffff) clone(0x8889cd00, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000004c0)={0x7ff, 0x9, 0x0, 0x0, 0xffffffffffffc8ad}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000005c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7f, 0xdd}) 23:01:06 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x40000000000001fb, &(0x7f0000000000)=[&(0x7f0000b61000/0xa000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000b0e000/0x3000)=nil], &(0x7f0000000140)=[0xfffffffffffffff7], &(0x7f0000000100), 0x4) 23:01:06 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140), 0x3d0a) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x6, 0x7f, 0x69, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000001c0)={r1, 0x0, 0x7f}, 0x8) sched_setaffinity(0x0, 0xfffffffffffffcf8, &(0x7f0000000040)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x20000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000014c0)={r1, @in6={{0xa, 0x4e24, 0x9, @rand_addr="a301058736369b818dd0cebec2c73102", 0x5}}, 0x9, 0x10000}, &(0x7f0000001580)=0x88) io_setup(0x40, &(0x7f0000000280)=0x0) io_getevents(r3, 0xffffffff, 0x2, &(0x7f0000000340)=[{}, {}], &(0x7f0000000380)) connect$inet(r2, &(0x7f0000000100), 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000001400)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000400)=""/4096}, &(0x7f0000001480)=0x50) sendfile(r2, r4, 0x0, 0xffffffffffffff9e) [ 299.972615] chnl_net:caif_netlink_parms(): no params data found [ 300.016189] device bridge_slave_1 left promiscuous mode [ 300.022800] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.075864] device bridge_slave_0 left promiscuous mode [ 300.081715] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.211928] device hsr_slave_1 left promiscuous mode [ 300.253946] device hsr_slave_0 left promiscuous mode [ 300.296360] team0 (unregistering): Port device team_slave_1 removed [ 300.308531] team0 (unregistering): Port device team_slave_0 removed [ 300.321628] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 300.365504] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 300.471411] bond0 (unregistering): Released all slaves [ 300.591572] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.598241] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.605290] device bridge_slave_0 entered promiscuous mode [ 300.613050] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.619557] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.626505] device bridge_slave_1 entered promiscuous mode [ 300.646498] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 300.656139] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 300.674545] WARNING: CPU: 1 PID: 2497 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x20ed/0x2980 [ 300.674779] kobject: 'veth1_to_team' (00000000e6cdd80d): kobject_add_internal: parent: 'net', set: 'devices' [ 300.684777] Kernel panic - not syncing: panic_on_warn set ... [ 300.684796] CPU: 1 PID: 2497 Comm: kworker/u4:3 Not tainted 5.0.0-rc3 #36 [ 300.684804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.684824] Workqueue: bat_events batadv_mcast_mla_update [ 300.684831] Call Trace: [ 300.684850] dump_stack+0x1db/0x2d0 [ 300.684868] ? dump_stack_print_info.cold+0x20/0x20 [ 300.684889] ? batadv_mcast_mla_update+0x20c0/0x2980 [ 300.696173] kobject: 'veth1_to_team' (00000000e6cdd80d): kobject_uevent_env [ 300.700726] panic+0x2cb/0x65c [ 300.700743] ? add_taint.cold+0x16/0x16 [ 300.700762] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.700776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.700791] ? __probe_kernel_read+0x1f4/0x250 [ 300.700807] ? __warn.cold+0x5/0x48 [ 300.707825] kobject: 'veth1_to_team' (00000000e6cdd80d): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team' [ 300.717075] ? __warn+0xe8/0x1d0 [ 300.722774] kobject: 'queues' (00000000c9a6f8d4): kobject_add_internal: parent: 'veth1_to_team', set: '' [ 300.725176] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.729155] kobject: 'queues' (00000000c9a6f8d4): kobject_uevent_env [ 300.733785] __warn.cold+0x20/0x48 [ 300.738909] kobject: 'queues' (00000000c9a6f8d4): kobject_uevent_env: filter function caused the event to drop! [ 300.745958] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.749193] kobject: 'rx-0' (0000000063644707): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.753102] report_bug+0x263/0x2b0 [ 300.758296] kobject: 'rx-0' (0000000063644707): kobject_uevent_env [ 300.763723] do_error_trap+0x11b/0x200 [ 300.768373] kobject: 'rx-0' (0000000063644707): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team/queues/rx-0' [ 300.771911] do_invalid_op+0x37/0x50 [ 300.782695] kobject: 'tx-0' (000000002cc3f01d): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.785900] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.796307] kobject: 'tx-0' (000000002cc3f01d): kobject_uevent_env [ 300.801126] invalid_op+0x14/0x20 [ 300.801143] RIP: 0010:batadv_mcast_mla_update+0x20ed/0x2980 [ 300.801161] Code: 49 c1 ee 03 48 b8 00 00 00 00 00 fc ff df be f8 f8 ff ff 66 41 89 34 06 48 c1 ea 03 c6 04 02 f8 e9 87 ea ff ff e8 c3 d8 af f9 <0f> 0b e9 cf e6 ff ff e8 b7 d8 af f9 48 8b 95 00 fe ff ff 49 c1 ee [ 300.807948] kobject: 'tx-0' (000000002cc3f01d): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team/queues/tx-0' [ 300.811162] RSP: 0018:ffff8880a2c17788 EFLAGS: 00010293 [ 300.822508] kobject: 'batman_adv' (00000000740b1c07): kobject_add_internal: parent: 'veth1_to_team', set: '' [ 300.826553] RAX: ffff8880a2c04100 RBX: 0000000000000001 RCX: ffffffff87d20cfa [ 300.836464] kobject: 'team_slave_1' (000000008f19057d): kobject_add_internal: parent: 'net', set: 'devices' [ 300.839506] RDX: 0000000000000000 RSI: ffffffff87d2262d RDI: 0000000000000007 [ 300.839516] RBP: ffff8880a2c179e0 R08: ffff8880a2c04100 R09: ffff8880a2c049c8 [ 300.839525] R10: ffff8880a2c04100 R11: 0000000000000000 R12: ffff8880a2c17868 [ 300.839533] R13: 0000000000000000 R14: 1ffff11014582f0d R15: ffff8880a2c179b8 [ 300.839560] ? batadv_mcast_mla_update+0x7ba/0x2980 [ 300.839576] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.846925] kobject: 'team_slave_1' (000000008f19057d): kobject_uevent_env [ 300.849777] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 300.849804] ? batadv_mcast_querier_log.isra.0+0x140/0x140 [ 300.849822] ? trace_hardirqs_off+0xb8/0x310 [ 300.860794] kobject: 'team_slave_1' (000000008f19057d): fill_kobj_path: path = '/devices/virtual/net/team_slave_1' [ 300.864432] ? kasan_check_read+0x11/0x20 [ 300.873916] kobject: 'queues' (00000000f444cf44): kobject_add_internal: parent: 'team_slave_1', set: '' [ 300.878860] ? do_raw_spin_unlock+0xa0/0x330 [ 300.878881] ? process_one_work+0xbf1/0x1ce0 [ 300.878897] ? find_held_lock+0x35/0x120 [ 300.885230] kobject: 'queues' (00000000f444cf44): kobject_uevent_env [ 300.888645] ? add_lock_to_list.isra.0+0x450/0x450 [ 300.888662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.888674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.888690] ? check_preemption_disabled+0x48/0x290 [ 300.888708] ? __lock_is_held+0xb6/0x140 [ 300.888737] process_one_work+0xd0c/0x1ce0 [ 300.888754] ? preempt_notifier_register+0x200/0x200 [ 300.888772] ? __switch_to_asm+0x34/0x70 [ 300.894505] kobject: 'queues' (00000000f444cf44): kobject_uevent_env: filter function caused the event to drop! [ 300.913370] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 300.913385] ? __schedule+0x89f/0x1e60 [ 300.913404] ? pci_mmcfg_check_reserved+0x170/0x170 [ 300.913421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 300.913437] ? worker_thread+0x3b7/0x14a0 [ 300.924484] kobject: 'rx-0' (00000000518120f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.929689] ? find_held_lock+0x35/0x120 [ 300.929708] ? lock_acquire+0x1db/0x570 [ 300.929724] ? worker_thread+0x3cd/0x14a0 [ 300.929745] ? kasan_check_read+0x11/0x20 [ 300.940323] kobject: 'rx-0' (00000000518120f7): kobject_uevent_env [ 300.947470] ? do_raw_spin_lock+0x156/0x360 [ 300.947482] ? lock_release+0xc40/0xc40 [ 300.947499] ? rwlock_bug.part.0+0x90/0x90 [ 300.947515] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.957482] kobject: 'rx-0' (00000000518120f7): fill_kobj_path: path = '/devices/virtual/net/team_slave_1/queues/rx-0' [ 300.964649] worker_thread+0x143/0x14a0 [ 300.972446] kobject: 'tx-0' (000000002e343124): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.979192] ? process_one_work+0x1ce0/0x1ce0 [ 300.979206] ? __kthread_parkme+0xc3/0x1b0 [ 300.979222] ? lock_acquire+0x1db/0x570 [ 300.986690] kobject: 'tx-0' (000000002e343124): kobject_uevent_env [ 300.991485] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 300.991502] ? lockdep_hardirqs_on+0x415/0x5d0 [ 300.991519] ? trace_hardirqs_on+0xbd/0x310 [ 300.991533] ? __kthread_parkme+0xc3/0x1b0 [ 300.996676] kobject: 'tx-0' (000000002e343124): fill_kobj_path: path = '/devices/virtual/net/team_slave_1/queues/tx-0' [ 301.003627] ? trace_hardirqs_off_caller+0x300/0x300 [ 301.003642] ? do_raw_spin_trylock+0x270/0x270 [ 301.003656] ? schedule+0x108/0x350 [ 301.003672] ? do_raw_spin_trylock+0x270/0x270 [ 301.009792] kobject: 'batman_adv' (00000000388d6ec8): kobject_add_internal: parent: 'team_slave_1', set: '' [ 301.014379] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 301.020027] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.029251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.029266] ? __kthread_parkme+0xfb/0x1b0 [ 301.029284] kthread+0x357/0x430 [ 301.029301] ? process_one_work+0x1ce0/0x1ce0 [ 301.034275] team0: Port device team_slave_0 added [ 301.043473] ? kthread_stop+0x920/0x920 [ 301.043493] ret_from_fork+0x3a/0x50 [ 301.048872] Kernel Offset: disabled [ 301.329143] Rebooting in 86400 seconds..