[ 36.197781][ T26] audit: type=1800 audit(1554330056.977:28): pid=7475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.925630][ T26] audit: type=1800 audit(1554330057.807:29): pid=7475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 36.946744][ T26] audit: type=1800 audit(1554330057.807:30): pid=7475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [....] startpar: service(s) returned failure: ssh ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.124' (ECDSA) to the list of known hosts. 2019/04/03 22:21:25 fuzzer started 2019/04/03 22:21:28 dialing manager at 10.128.0.26:37451 2019/04/03 22:21:28 syscalls: 2408 2019/04/03 22:21:28 code coverage: enabled 2019/04/03 22:21:28 comparison tracing: enabled 2019/04/03 22:21:28 extra coverage: extra coverage is not supported by the kernel 2019/04/03 22:21:28 setuid sandbox: enabled 2019/04/03 22:21:28 namespace sandbox: enabled 2019/04/03 22:21:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/03 22:21:28 fault injection: enabled 2019/04/03 22:21:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/03 22:21:28 net packet injection: enabled 2019/04/03 22:21:28 net device setup: enabled 22:21:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) syzkaller login: [ 72.867418][ T7662] IPVS: ftp: loaded support on port[0] = 21 22:21:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 72.962300][ T7662] chnl_net:caif_netlink_parms(): no params data found [ 73.034642][ T7662] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.052016][ T7662] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.092107][ T7662] device bridge_slave_0 entered promiscuous mode [ 73.101894][ T7662] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.112054][ T7662] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.131072][ T7662] device bridge_slave_1 entered promiscuous mode [ 73.150044][ T7665] IPVS: ftp: loaded support on port[0] = 21 [ 73.170806][ T7662] bond0: Enslaving bond_slave_0 as an active interface with an up link 22:21:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a40)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "64470b49a014a65d"}, 0x35}}]}, 0x2c}}, 0x0) [ 73.202107][ T7662] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.268174][ T7662] team0: Port device team_slave_0 added [ 73.294413][ T7662] team0: Port device team_slave_1 added [ 73.363649][ T7662] device hsr_slave_0 entered promiscuous mode 22:21:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) [ 73.412484][ T7662] device hsr_slave_1 entered promiscuous mode [ 73.478717][ T7667] IPVS: ftp: loaded support on port[0] = 21 [ 73.559327][ T7665] chnl_net:caif_netlink_parms(): no params data found [ 73.579677][ T7662] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.587011][ T7662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.595272][ T7662] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.602494][ T7662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.623619][ T7670] IPVS: ftp: loaded support on port[0] = 21 22:21:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) [ 73.700876][ T7665] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.709832][ T7665] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.720732][ T7665] device bridge_slave_0 entered promiscuous mode [ 73.762975][ T7665] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.770259][ T7665] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.794358][ T7665] device bridge_slave_1 entered promiscuous mode [ 73.848552][ T7673] IPVS: ftp: loaded support on port[0] = 21 [ 73.849466][ T7662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.870024][ T7665] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.904108][ T7665] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.924310][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.947113][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.966622][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.975133][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.991585][ T7662] 8021q: adding VLAN 0 to HW filter on device team0 22:21:34 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) [ 74.043455][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.055474][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.067067][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.074249][ T7674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.084030][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.093416][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.108843][ T7674] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.116187][ T7674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.168193][ T7665] team0: Port device team_slave_0 added [ 74.176343][ T7665] team0: Port device team_slave_1 added [ 74.187698][ T7678] IPVS: ftp: loaded support on port[0] = 21 [ 74.215320][ T7667] chnl_net:caif_netlink_parms(): no params data found [ 74.293927][ T7665] device hsr_slave_0 entered promiscuous mode [ 74.371696][ T7665] device hsr_slave_1 entered promiscuous mode [ 74.413706][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.422949][ T7670] chnl_net:caif_netlink_parms(): no params data found [ 74.454211][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.484448][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.494123][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.503026][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.512400][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.539512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.549306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.563362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.597330][ T7667] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.605481][ T7667] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.613581][ T7667] device bridge_slave_0 entered promiscuous mode [ 74.633844][ T7667] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.641645][ T7667] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.649466][ T7667] device bridge_slave_1 entered promiscuous mode [ 74.657343][ T7670] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.665381][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.673601][ T7670] device bridge_slave_0 entered promiscuous mode [ 74.681529][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.689837][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.698995][ T7662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.722108][ T7670] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.729491][ T7670] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.739484][ T7670] device bridge_slave_1 entered promiscuous mode [ 74.798669][ T7670] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.812556][ T7667] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.823795][ T7667] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.837737][ T7678] chnl_net:caif_netlink_parms(): no params data found [ 74.849959][ T7670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.893486][ T7673] chnl_net:caif_netlink_parms(): no params data found [ 74.932246][ T7670] team0: Port device team_slave_0 added [ 74.958324][ T7667] team0: Port device team_slave_0 added [ 74.968688][ T7667] team0: Port device team_slave_1 added [ 74.976742][ T7670] team0: Port device team_slave_1 added [ 74.999037][ T7673] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.008339][ T7673] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.016483][ T7673] device bridge_slave_0 entered promiscuous mode [ 75.028347][ T7673] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.035955][ T7673] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.044188][ T7673] device bridge_slave_1 entered promiscuous mode [ 75.123812][ T7670] device hsr_slave_0 entered promiscuous mode [ 75.161474][ T7670] device hsr_slave_1 entered promiscuous mode [ 75.204924][ T7662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.273884][ T7667] device hsr_slave_0 entered promiscuous mode [ 75.331343][ T7667] device hsr_slave_1 entered promiscuous mode [ 75.415325][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.422691][ T7678] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.430420][ T7678] device bridge_slave_0 entered promiscuous mode [ 75.460187][ T7673] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.476031][ T7673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 75.497697][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.506471][ T7678] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.515033][ T7678] device bridge_slave_1 entered promiscuous mode [ 75.547799][ T7678] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 75.576358][ T7678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 75.604863][ T7673] team0: Port device team_slave_0 added [ 75.615645][ T7665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.627975][ T7678] team0: Port device team_slave_0 added [ 75.636252][ T7678] team0: Port device team_slave_1 added [ 75.644769][ T7673] team0: Port device team_slave_1 added [ 75.668510][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.676779][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.695638][ T7670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.706271][ T7665] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.763013][ T7678] device hsr_slave_0 entered promiscuous mode [ 75.801328][ T7678] device hsr_slave_1 entered promiscuous mode [ 75.848591][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.857878][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.866790][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.873909][ T7674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.892397][ T7667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.905709][ T7670] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.944913][ T7673] device hsr_slave_0 entered promiscuous mode [ 76.001547][ T7673] device hsr_slave_1 entered promiscuous mode [ 76.052378][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.060573][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.068762][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.076909][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.087327][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.096232][ T3337] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.103745][ T3337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.112302][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.121228][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.130046][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.138858][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.147853][ T3337] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.173882][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.186601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.196433][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.207016][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.216237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.225524][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.235169][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.242333][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.250536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.260749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.278299][ T7665] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.290293][ T7665] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.312960][ T7667] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.327305][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.337070][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.346366][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.355553][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.364052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.372607][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.381036][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.388877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.397035][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.405649][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.414927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:21:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) [ 76.423582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.432472][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.479688][ T7665] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.487706][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.497424][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.506232][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.515377][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.524068][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.533268][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.542956][ T7670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.555552][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.565297][ T7674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.574383][ T7674] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.581506][ T7674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.590299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.604812][ T7678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.634585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.647675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.657185][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.664343][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.672968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.687996][ T7678] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.704775][ T7670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.736862][ T7673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.748466][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.758762][ C1] hrtimer: interrupt took 44258 ns [ 76.766923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.771091][ C0] sched: DL replenish lagged too much [ 76.781243][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.789497][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.798917][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.813302][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.817261][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 76.822385][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.822778][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.822823][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.830154][ T7667] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 76.869387][ T7667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.905625][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 76.917971][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.926252][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.935709][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.944759][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.953698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.963241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.971735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.030755][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.039093][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.048902][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.058479][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.065659][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.074273][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.083266][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.092232][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.100817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.109449][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.118486][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.129252][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 22:21:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) 22:21:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) [ 77.333360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.344794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.378965][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 77.389556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.398318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.407715][ T7678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:21:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) [ 77.423772][ T7673] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.439213][ T7667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.479476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.504194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.596431][ T7678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.622352][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 22:21:38 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) [ 77.671908][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.681436][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.688509][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.744866][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.771528][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.781758][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.789314][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.831242][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.842239][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.850844][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.892107][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.901729][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.909715][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 22:21:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a40)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "64470b49a014a65d"}, 0x35}}]}, 0x2c}}, 0x0) [ 77.967546][ T7673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 78.001822][ T7673] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 22:21:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) [ 78.054181][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.117641][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.132523][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.171677][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.189929][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.231540][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.242554][ T7671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.343212][ T7673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.597783][ T7740] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 22:21:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a40)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "64470b49a014a65d"}, 0x35}}]}, 0x2c}}, 0x0) 22:21:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:39 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) 22:21:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) 22:21:40 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r0, 0x0) 22:21:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a40)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_SET={0x18, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "64470b49a014a65d"}, 0x35}}]}, 0x2c}}, 0x0) 22:21:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) 22:21:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) [ 79.295802][ T7769] IPVS: ftp: loaded support on port[0] = 21 22:21:40 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:40 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) 22:21:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 79.590180][ T7784] IPVS: ftp: loaded support on port[0] = 21 22:21:40 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:40 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:41 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) [ 80.072805][ T7798] IPVS: ftp: loaded support on port[0] = 21 22:21:41 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:41 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="7f454c46d4000001c20d0000000000000000070008000000fb00000038dd7fccbc74906304000000020020000000ffff00000000060000002e14000003005af34530a79cb1b3406feed7199900000600000078000000030000000400000006000000a3090000070000000000000004000000ffff4d65b2094fae099c13adfc54d94d73716f799617958fcc55d06930865333917d85ef37a235ba2690036cc1e55e0d3f37a0470562e843ca4525b4d4c6df7ba8617fd650f6d0cd5eea2cb8c3a81e2e00c19c7e00948aeacc202d0409a9f60d688cfd35c86e61513e6dbb2dd037e5ec4b5fafc895bc580f027c02af6ae39a5aecdf0545fb87b60407e8e91df52862f653cdf0d9ce25f2645a042eb1444739d8753ab49b4022ab1ce73ed30c1974a3210705518a13b6a21cb6e0a32215c034dd7f93edf8da73ce1d984119adca24a1fa98b66d0d3b57a8bc1d190ee48ef651087a85019a4181a4defdd990ca64b2b249624c73190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001604a034fb4538b2000ed65b4c300000000000000000000000000000000000000002f9e611b676600acbdff57d5d30e37e123fda8cb8c84acc572ac9fe756ee739517b968d1932506afedf77c47ea1ecc259b224ab5cb927b3fdd781be55a0b7d6a73815b3720654da23d0865ff72eb1b13f584f736dde12cb8783fa54ddb8fe8e8f29ef5adaddae5d7dd9d41438b69112d86b05fe8d1f99597c75bacaa1da8cf33610567186030267f7fbeebbb43be390232999a4ac262165000d938195014ff0f7f19f5b02525e1d7ec2bcc0b41d2ad1baade4fd400aa7f6c3d57ebfc8c1040abe78685070d80dced5a6758995e75f1baac21f00baefbc3537445a8fb3c3694a6531c"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 82.030001][ T7878] IPVS: ftp: loaded support on port[0] = 21 [ 82.170197][ T7886] IPVS: ftp: loaded support on port[0] = 21 [ 82.374275][ T7887] IPVS: ftp: loaded support on port[0] = 21 22:21:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 82.727538][ T7900] IPVS: ftp: loaded support on port[0] = 21 [ 82.765967][ T7903] IPVS: ftp: loaded support on port[0] = 21 22:21:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:43 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 22:21:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg$nl_xfrm(r2, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000009c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff000000000000000000000000000000000000000000000000000000000000000080fe6a727295d5da14e6cef1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002000000000000000000480003006465666c61746500"/252], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800000000000) syz_genetlink_get_family_id$team(&(0x7f0000006700)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006780)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r4, 0xff, 0x0, 0x2008, 0x2}, &(0x7f00000001c0)=0xffec) write$binfmt_elf32(r0, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x358) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r5, 0x10001, 0x4}, 0xfffffffffffffdb5) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000067c0)={'vcan0\x00'}) getsockname$tipc(r1, &(0x7f0000000200), &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000800)) getsockname(r0, &(0x7f0000006e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006f00)=0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000380)=""/80, 0x50) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000002c0)={'erspan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) ioctl(r7, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000c00)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @loopback}, 0x0, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000400)="e4bd919afca5100362300b09a26007682b1068dc753f83", 0x17}], 0x1}, 0x40090) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) [ 83.164318][ T7905] IPVS: ftp: loaded support on port[0] = 21 [ 83.304510][ T7917] IPVS: ftp: loaded support on port[0] = 21 22:21:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 83.870051][ T7936] IPVS: ftp: loaded support on port[0] = 21 [ 83.909851][ T7924] IPVS: ftp: loaded support on port[0] = 21 [ 83.949755][ T7926] IPVS: ftp: loaded support on port[0] = 21 [ 83.956784][ T7931] IPVS: ftp: loaded support on port[0] = 21 [ 84.011743][ T7938] IPVS: ftp: loaded support on port[0] = 21 22:21:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) [ 84.240236][ T7932] IPVS: ftp: loaded support on port[0] = 21 22:21:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) 22:21:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 84.704044][ T7948] IPVS: ftp: loaded support on port[0] = 21 22:21:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x12], [0xc1]}) 22:21:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 85.086584][ T7959] IPVS: ftp: loaded support on port[0] = 21 22:21:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) 22:21:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 88.470413][ T7981] IPVS: ftp: loaded support on port[0] = 21 [ 88.494473][ T7986] IPVS: ftp: loaded support on port[0] = 21 [ 88.516144][ T7983] IPVS: ftp: loaded support on port[0] = 21 22:21:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) [ 88.605894][ T7982] IPVS: ftp: loaded support on port[0] = 21 22:21:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 88.815831][ T7997] IPVS: ftp: loaded support on port[0] = 21 22:21:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0xc4, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x4) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r3}) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r2, 0x0) unshare(0x40000000) [ 89.140642][ T8003] IPVS: ftp: loaded support on port[0] = 21 22:21:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:52 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000240)={0xa}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x525, 0x0, 0x0, {0xa000000, 0x0, 0x0, 0x0, 0xf0ffff, 0x3}}, 0x1c}}, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 22:21:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x200000004, 0x401, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) 22:21:53 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000002c0)="37bf714a03a40959c32786a153def83556fa50cd07a17e57dec67c6416a295c095eb32a4f530f4c9d5a1097ec9cb7ae16740e3757f15b6dcf57990782d6184c5e4008d0a13c88dde2489844d5ac77297e284a19202b19948d27e47580f8ba3d97f4b9c4002ed0be3a4772706db21e6218c26e76063cb18300682ff759367394a3dd6a021fbb7b9fbcf") ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)="51051d7f459133fea2c7afd3c28649ae69466674a8910746ef3f1354589d40fd7ebbe4f0594194e07066c473eb6fe4e0a23091aa5cfcb42918") r2 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000380)='`', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000400)) ptrace$setregset(0x4204, r1, 0x2, &(0x7f00000001c0)={0x0, 0xffffffffffffffc5}) 22:21:53 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:53 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:54 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:54 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) close(r1) 22:21:54 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:54 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:54 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:54 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:55 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:56 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:57 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 1: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:58 executing program 4: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:59 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:59 executing program 5: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:59 executing program 0: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:59 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:21:59 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:21:59 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:21:59 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:00 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:00 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 2: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000680)={0xaa, 0xc}) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2880, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ustat(0xe, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000200)=0xf95, 0x11d) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000005c0)=0xb7, 0x4) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='^\x00', r4) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000580)=0x5) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000880)={0x0, 0x0, 0x2080}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000400)={0x5892}, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x7, 0x1, 0x12f, 0x80000000, 0x5}, 0xc) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000440)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xce7, @remote, 0x47d753df}, @in6={0xa, 0x4e21, 0x2, @local, 0x20}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x10000000, @multicast1}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x1}], 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080), 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/71, 0x47}], 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) inotify_rm_watch(0xffffffffffffffff, 0x0) 22:22:00 executing program 4: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:00 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:00 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:01 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:01 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000040), 0x4) 22:22:01 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f0000000040), 0x4) 22:22:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f0000000040), 0x4) 22:22:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) 22:22:02 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:02 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:22:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f0000000040), 0x4) 22:22:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) 22:22:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xb, &(0x7f0000000040), 0x4) 22:22:02 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xe, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 101.762553][ T8512] mkiss: ax0: crc mode is auto. 22:22:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) 22:22:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 102.203377][ T8544] mkiss: ax0: crc mode is auto. 22:22:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) 22:22:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000), 0x1) 22:22:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 5: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:03 executing program 5: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x4, r3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:22:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000), 0x1) 22:22:03 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:03 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:03 executing program 5: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000), 0x1) 22:22:04 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:04 executing program 5: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000), 0x1) 22:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/tcp6\x00') preadv(r0, &(0x7f0000003740)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, 0x91) [ 103.432189][ T8600] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:04 executing program 0: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x1008, 0x0) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x3, 0x0) 22:22:04 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:04 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/tcp6\x00') preadv(r0, &(0x7f0000003740)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, 0x91) [ 103.713029][ T8635] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:04 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/tcp6\x00') preadv(r0, &(0x7f0000003740)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, 0x91) 22:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:04 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 103.965322][ T8648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/tcp6\x00') preadv(r0, &(0x7f0000003740)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, 0x91) 22:22:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:05 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:05 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 104.329905][ T8661] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) [ 104.675623][ T8687] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) [ 104.949798][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) [ 105.148157][ T8704] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r1, &(0x7f0000000040)="0503000002003f0000000000c52cf7c21975e697b02f08066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b33142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 22:22:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 105.377660][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 105.610281][ T8723] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 105.824902][ T8730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 106.090682][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 106.303725][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 106.495229][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 106.685745][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 106.747559][ T8745] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 106.828843][ T8748] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 107.011800][ T8751] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:07 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 107.300491][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 107.459877][ T8757] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 107.570144][ T8760] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 107.725359][ T8771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:08 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fcntl$getown(r0, 0x9) getpgrp(0x0) r2 = gettid() getpgid(r2) fstat(r1, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) socket$pppoe(0x18, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 107.993582][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:09 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 108.318116][ T8788] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 108.410136][ T8793] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:09 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 108.620477][ T8800] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:09 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) [ 108.768392][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:22:09 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:09 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) close(r0) 22:22:10 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, r4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x1}, [{0x2, 0x2}, {}], {}, [], {}, {0x20, 0x2}}, 0x34, 0x3) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69a", @ANYRESDEC=0x0]) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="675dd43d88415058c99465eae80a02b83b27524c4411f28189686d42130264a1ab54082f3bc75b200373c4f5ce1923e132017a5230d7adb8f99aaeaa3fd4b099", 0x40, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='trusted\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000440)='##\x00', 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000480)='cifs.idmap\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='/dev/cec#\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)={0xd0}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3, 0x3, 0xfffffffffffffbff, 0x3, r6}) 22:22:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xa4}]}, &(0x7f0000000000)='GPG80\xe4\x1e\x05\xc1I\xe8\xe1\xb0\xbd\x86[\xa2JjNXp3K\xd5I\x84\x13\xd0\xce\x8c\x96\x93\xd2XmO~\xe4\xdd\xb1~$FU\xdf\x83t\x1b\xbbG\xe4~\xde\x01\xe1Y\xdf@\x8a\xf6\x88\x86j\xeeGQ\aa\x14,\xa2 \xadC>\xbc\x9b/\xbdk\x98\x00A/\x95_R_\xc4cd\xfd\xe72\xa4xi\xca\xd6\xc8AK0\x1fd*:\x1cV;\xc5P\xe8\x7f\fI>xx]M\x95]\x13\xf8=\xae\x83', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:22:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) close(r0) [ 110.104415][ T8955] ================================================================== [ 110.113059][ T8955] BUG: KASAN: use-after-free in rdma_bind_addr+0x1dfa/0x1f80 [ 110.120629][ T8955] Read of size 8 at addr ffff8880a7c27a48 by task syz-executor.5/8955 [ 110.129489][ T8955] [ 110.131848][ T8955] CPU: 0 PID: 8955 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190403 #17 [ 110.140966][ T8955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.151418][ T8955] Call Trace: [ 110.154755][ T8955] dump_stack+0x172/0x1f0 [ 110.159937][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 110.165074][ T8955] print_address_description.cold+0x7c/0x20d [ 110.171131][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 110.176587][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 110.181623][ T8955] kasan_report.cold+0x1b/0x40 [ 110.186572][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 110.191590][ T8955] __asan_report_load8_noabort+0x14/0x20 [ 110.197298][ T8955] rdma_bind_addr+0x1dfa/0x1f80 [ 110.202767][ T8955] ? trace_hardirqs_on+0x67/0x230 [ 110.207875][ T8955] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 110.213332][ T8955] ? _crng_backtrack_protect+0xff/0x140 [ 110.218951][ T8955] ? memset+0x32/0x40 [ 110.222923][ T8955] ? get_random_bytes+0x35/0x40 [ 110.227859][ T8955] rdma_resolve_addr+0x437/0x21f0 [ 110.232878][ T8955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.239134][ T8955] ? refcount_inc_not_zero_checked+0x144/0x200 [ 110.245371][ T8955] ? rdma_bind_addr+0x1f80/0x1f80 [ 110.250383][ T8955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 110.256627][ T8955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 110.263207][ T8955] ? refcount_inc_checked+0x2b/0x70 [ 110.272710][ T8955] rdma_create_trans+0xaec/0x1390 [ 110.277768][ T8955] ? rdma_create_trans+0xaec/0x1390 [ 110.283146][ T8955] ? legacy_get_tree+0xf2/0x200 [ 110.287986][ T8955] ? vfs_get_tree+0x123/0x450 [ 110.292651][ T8955] ? do_mount+0x1436/0x2c40 [ 110.297245][ T8955] ? post_recv.isra.0+0x550/0x550 [ 110.303227][ T8955] ? find_held_lock+0x35/0x130 [ 110.307991][ T8955] ? debug_check_no_obj_freed+0x211/0x444 [ 110.313704][ T8955] ? kasan_check_write+0x14/0x20 [ 110.318727][ T8955] ? lock_downgrade+0x880/0x880 [ 110.323630][ T8955] ? trace_hardirqs_off+0x62/0x220 [ 110.328834][ T8955] ? kfree+0x173/0x230 [ 110.333144][ T8955] ? p9_client_create+0x82c/0x1400 [ 110.338331][ T8955] ? lockdep_hardirqs_on+0x418/0x5d0 [ 110.343616][ T8955] ? trace_hardirqs_on+0x67/0x230 [ 110.348716][ T8955] ? p9_client_create+0x82c/0x1400 [ 110.353936][ T8955] p9_client_create+0x89c/0x1400 [ 110.358984][ T8955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 110.364974][ T8955] ? p9_client_zc_rpc.constprop.0+0x10c0/0x10c0 [ 110.371348][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 110.377144][ T8955] ? ksys_mount+0xdb/0x150 [ 110.381826][ T8955] ? lockdep_init_map+0x1be/0x6d0 [ 110.387109][ T8955] v9fs_session_init+0x1e7/0x1960 [ 110.392127][ T8955] ? v9fs_session_init+0x1e7/0x1960 [ 110.397428][ T8955] ? find_held_lock+0x35/0x130 [ 110.402268][ T8955] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 110.408340][ T8955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.415007][ T8955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 110.420807][ T8955] ? v9fs_show_options+0x7e0/0x7e0 [ 110.425927][ T8955] ? v9fs_mount+0x5e/0x920 [ 110.430343][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 110.436604][ T8955] ? kmem_cache_alloc_trace+0x354/0x760 [ 110.442228][ T8955] ? vfs_parse_fs_string+0x111/0x170 [ 110.447679][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 110.453393][ T8955] v9fs_mount+0x7d/0x920 [ 110.457888][ T8955] ? vfs_parse_fs_param+0x510/0x510 [ 110.463076][ T8955] ? v9fs_write_inode+0x70/0x70 [ 110.467934][ T8955] legacy_get_tree+0xf2/0x200 [ 110.472692][ T8955] vfs_get_tree+0x123/0x450 [ 110.477536][ T8955] do_mount+0x1436/0x2c40 [ 110.481877][ T8955] ? copy_mount_string+0x40/0x40 [ 110.486894][ T8955] ? _copy_from_user+0xdd/0x150 [ 110.491755][ T8955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.498159][ T8955] ? copy_mount_options+0x280/0x3a0 [ 110.503625][ T8955] ksys_mount+0xdb/0x150 [ 110.508114][ T8955] __x64_sys_mount+0xbe/0x150 [ 110.512803][ T8955] do_syscall_64+0x103/0x610 [ 110.517480][ T8955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.523645][ T8955] RIP: 0033:0x4582b9 [ 110.528276][ T8955] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 110.549262][ T8955] RSP: 002b:00007f246d5d7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 110.557667][ T8955] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004582b9 [ 110.565741][ T8955] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 00000000200003c0 [ 110.574054][ T8955] RBP: 000000000073bfa0 R08: 0000000020000a00 R09: 0000000000000000 [ 110.582381][ T8955] R10: 000000000000c004 R11: 0000000000000246 R12: 00007f246d5d86d4 [ 110.590702][ T8955] R13: 00000000004c4056 R14: 00000000004d7688 R15: 00000000ffffffff [ 110.598992][ T8955] [ 110.601307][ T8955] Allocated by task 8615: [ 110.605906][ T8955] save_stack+0x45/0xd0 [ 110.610394][ T8955] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 110.616048][ T8955] kasan_kmalloc+0x9/0x10 [ 110.620402][ T8955] kmem_cache_alloc_trace+0x151/0x760 [ 110.625765][ T8955] cma_alloc_port+0x4f/0x1a0 [ 110.630524][ T8955] rdma_bind_addr+0x1658/0x1f80 [ 110.635719][ T8955] rdma_resolve_addr+0x437/0x21f0 [ 110.640952][ T8955] rdma_create_trans+0xaec/0x1390 [ 110.646050][ T8955] p9_client_create+0x89c/0x1400 [ 110.650984][ T8955] v9fs_session_init+0x1e7/0x1960 [ 110.656073][ T8955] v9fs_mount+0x7d/0x920 [ 110.660488][ T8955] legacy_get_tree+0xf2/0x200 [ 110.665497][ T8955] vfs_get_tree+0x123/0x450 [ 110.669993][ T8955] do_mount+0x1436/0x2c40 [ 110.674392][ T8955] ksys_mount+0xdb/0x150 [ 110.678820][ T8955] __x64_sys_mount+0xbe/0x150 [ 110.683665][ T8955] do_syscall_64+0x103/0x610 [ 110.688244][ T8955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.694223][ T8955] [ 110.696735][ T8955] Freed by task 8615: [ 110.700831][ T8955] save_stack+0x45/0xd0 [ 110.705500][ T8955] __kasan_slab_free+0x102/0x150 [ 110.710857][ T8955] kasan_slab_free+0xe/0x10 [ 110.715523][ T8955] kfree+0xcf/0x230 [ 110.719405][ T8955] rdma_destroy_id+0x7fc/0xaa0 [ 110.724157][ T8955] rdma_destroy_trans+0x179/0x1c0 [ 110.729428][ T8955] rdma_create_trans+0xffc/0x1390 [ 110.734876][ T8955] p9_client_create+0x89c/0x1400 [ 110.739806][ T8955] v9fs_session_init+0x1e7/0x1960 [ 110.744818][ T8955] v9fs_mount+0x7d/0x920 [ 110.749568][ T8955] legacy_get_tree+0xf2/0x200 [ 110.754245][ T8955] vfs_get_tree+0x123/0x450 [ 110.759016][ T8955] do_mount+0x1436/0x2c40 [ 110.763676][ T8955] ksys_mount+0xdb/0x150 [ 110.767905][ T8955] __x64_sys_mount+0xbe/0x150 [ 110.772754][ T8955] do_syscall_64+0x103/0x610 [ 110.777606][ T8955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.783479][ T8955] [ 110.785804][ T8955] The buggy address belongs to the object at ffff8880a7c27a40 [ 110.785804][ T8955] which belongs to the cache kmalloc-32 of size 32 [ 110.800103][ T8955] The buggy address is located 8 bytes inside of [ 110.800103][ T8955] 32-byte region [ffff8880a7c27a40, ffff8880a7c27a60) [ 110.813266][ T8955] The buggy address belongs to the page: [ 110.818975][ T8955] page:ffffea00029f09c0 count:1 mapcount:0 mapping:ffff88812c3f01c0 index:0xffff8880a7c27fc1 [ 110.829712][ T8955] flags: 0x1fffc0000000200(slab) [ 110.834648][ T8955] raw: 01fffc0000000200 ffffea0002739c48 ffffea000273b708 ffff88812c3f01c0 [ 110.843217][ T8955] raw: ffff8880a7c27fc1 ffff8880a7c27000 000000010000003f 0000000000000000 [ 110.851787][ T8955] page dumped because: kasan: bad access detected [ 110.858362][ T8955] [ 110.860672][ T8955] Memory state around the buggy address: [ 110.866482][ T8955] ffff8880a7c27900: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 110.874623][ T8955] ffff8880a7c27980: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 110.882942][ T8955] >ffff8880a7c27a00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 110.890989][ T8955] ^ [ 110.897387][ T8955] ffff8880a7c27a80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc 22:22:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) close(r0) [ 110.905438][ T8955] ffff8880a7c27b00: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 110.913749][ T8955] ================================================================== [ 110.922140][ T8955] Disabling lock debugging due to kernel taint 22:22:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x2c, r1, 0x211, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}]}]}, 0x2c}}, 0x0) 22:22:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) [ 111.013386][ T8966] Started in network mode 22:22:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xa4}]}, &(0x7f0000000000)='GPG80\xe4\x1e\x05\xc1I\xe8\xe1\xb0\xbd\x86[\xa2JjNXp3K\xd5I\x84\x13\xd0\xce\x8c\x96\x93\xd2XmO~\xe4\xdd\xb1~$FU\xdf\x83t\x1b\xbbG\xe4~\xde\x01\xe1Y\xdf@\x8a\xf6\x88\x86j\xeeGQ\aa\x14,\xa2 \xadC>\xbc\x9b/\xbdk\x98\x00A/\x95_R_\xc4cd\xfd\xe72\xa4xi\xca\xd6\xc8AK0\x1fd*:\x1cV;\xc5P\xe8\x7f\fI>xx]M\x95]\x13\xf8=\xae\x83', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:22:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) close(r0) 22:22:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) close(r0) [ 111.035696][ T8966] Own node identity , cluster identity 4711 [ 111.044008][ T8966] Failed to obtain node identity [ 111.049140][ T8966] Enabling of bearer rejected, failed to enable media 22:22:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) [ 111.113457][ T8978] Started in network mode [ 111.117863][ T8978] Own node identity , cluster identity 4711 [ 111.137377][ T8955] Kernel panic - not syncing: panic_on_warn set ... [ 111.144123][ T8955] CPU: 1 PID: 8955 Comm: syz-executor.5 Tainted: G B 5.1.0-rc3-next-20190403 #17 22:22:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) [ 111.154625][ T8955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.164946][ T8955] Call Trace: [ 111.168337][ T8955] dump_stack+0x172/0x1f0 [ 111.172806][ T8955] panic+0x2cb/0x65c [ 111.173507][ T3878] kobject: 'loop0' (000000005fdf1dff): kobject_uevent_env [ 111.176720][ T8955] ? __warn_printk+0xf3/0xf3 [ 111.188402][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 111.193717][ T8955] ? preempt_schedule+0x4b/0x60 [ 111.194806][ T3878] kobject: 'loop0' (000000005fdf1dff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 111.198571][ T8955] ? ___preempt_schedule+0x16/0x18 22:22:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000000), 0xe) [ 111.198591][ T8955] ? trace_hardirqs_on+0x5e/0x230 [ 111.219038][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 111.224079][ T8955] end_report+0x47/0x4f [ 111.228269][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 111.233397][ T8955] kasan_report.cold+0xe/0x40 [ 111.238192][ T8955] ? rdma_bind_addr+0x1dfa/0x1f80 [ 111.243237][ T8955] __asan_report_load8_noabort+0x14/0x20 [ 111.248980][ T8955] rdma_bind_addr+0x1dfa/0x1f80 [ 111.254293][ T8955] ? trace_hardirqs_on+0x67/0x230 [ 111.259612][ T8955] ? cma_ndev_work_handler+0x1c0/0x1c0 [ 111.265461][ T8955] ? _crng_backtrack_protect+0xff/0x140 [ 111.265507][ T3878] kobject: 'loop0' (000000005fdf1dff): kobject_uevent_env [ 111.271645][ T8955] ? memset+0x32/0x40 [ 111.271659][ T8955] ? get_random_bytes+0x35/0x40 [ 111.271678][ T8955] rdma_resolve_addr+0x437/0x21f0 [ 111.271694][ T8955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.271715][ T8955] ? refcount_inc_not_zero_checked+0x144/0x200 [ 111.271734][ T8955] ? rdma_bind_addr+0x1f80/0x1f80 [ 111.280015][ T3878] kobject: 'loop0' (000000005fdf1dff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 111.282998][ T8955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 111.283010][ T8955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 111.283024][ T8955] ? refcount_inc_checked+0x2b/0x70 [ 111.283042][ T8955] rdma_create_trans+0xaec/0x1390 [ 111.283060][ T8955] ? rdma_create_trans+0xaec/0x1390 [ 111.306572][ T8978] Failed to obtain node identity [ 111.310892][ T8955] ? legacy_get_tree+0xf2/0x200 [ 111.310905][ T8955] ? vfs_get_tree+0x123/0x450 [ 111.310916][ T8955] ? do_mount+0x1436/0x2c40 [ 111.310936][ T8955] ? post_recv.isra.0+0x550/0x550 [ 111.310948][ T8955] ? find_held_lock+0x35/0x130 [ 111.310963][ T8955] ? debug_check_no_obj_freed+0x211/0x444 [ 111.310986][ T8955] ? kasan_check_write+0x14/0x20 [ 111.331144][ T8978] Enabling of bearer rejected, failed to enable media [ 111.334238][ T8955] ? lock_downgrade+0x880/0x880 [ 111.334263][ T8955] ? trace_hardirqs_off+0x62/0x220 [ 111.354103][ T3878] kobject: 'loop2' (0000000099b813dd): kobject_uevent_env [ 111.355015][ T8955] ? kfree+0x173/0x230 [ 111.355036][ T8955] ? p9_client_create+0x82c/0x1400 [ 111.359885][ T3878] kobject: 'loop2' (0000000099b813dd): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 111.364878][ T8955] ? lockdep_hardirqs_on+0x418/0x5d0 [ 111.364890][ T8955] ? trace_hardirqs_on+0x67/0x230 [ 111.364901][ T8955] ? p9_client_create+0x82c/0x1400 [ 111.364914][ T8955] p9_client_create+0x89c/0x1400 [ 111.364930][ T8955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 111.364944][ T8955] ? p9_client_zc_rpc.constprop.0+0x10c0/0x10c0 [ 111.364958][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 111.364975][ T8955] ? ksys_mount+0xdb/0x150 [ 111.478423][ T8955] ? lockdep_init_map+0x1be/0x6d0 [ 111.483483][ T8955] v9fs_session_init+0x1e7/0x1960 [ 111.488559][ T8955] ? v9fs_session_init+0x1e7/0x1960 [ 111.493878][ T8955] ? find_held_lock+0x35/0x130 [ 111.498661][ T8955] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 111.507472][ T8955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 111.513731][ T8955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 111.521858][ T8955] ? v9fs_show_options+0x7e0/0x7e0 [ 111.527006][ T8955] ? v9fs_mount+0x5e/0x920 [ 111.531528][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 111.537250][ T8955] ? kmem_cache_alloc_trace+0x354/0x760 [ 111.543105][ T8955] ? vfs_parse_fs_string+0x111/0x170 [ 111.548396][ T8955] ? rcu_read_lock_sched_held+0x110/0x130 [ 111.554124][ T8955] v9fs_mount+0x7d/0x920 [ 111.558451][ T8955] ? vfs_parse_fs_param+0x510/0x510 [ 111.563836][ T8955] ? v9fs_write_inode+0x70/0x70 [ 111.568720][ T8955] legacy_get_tree+0xf2/0x200 [ 111.573854][ T8955] vfs_get_tree+0x123/0x450 [ 111.578372][ T8955] do_mount+0x1436/0x2c40 [ 111.582907][ T8955] ? copy_mount_string+0x40/0x40 [ 111.588019][ T8955] ? _copy_from_user+0xdd/0x150 [ 111.592965][ T8955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.599206][ T8955] ? copy_mount_options+0x280/0x3a0 [ 111.604511][ T8955] ksys_mount+0xdb/0x150 [ 111.608841][ T8955] __x64_sys_mount+0xbe/0x150 [ 111.613539][ T8955] do_syscall_64+0x103/0x610 [ 111.624700][ T8955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.630846][ T8955] RIP: 0033:0x4582b9 [ 111.635411][ T8955] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 111.656090][ T8955] RSP: 002b:00007f246d5d7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 111.664501][ T8955] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004582b9 [ 111.673425][ T8955] RDX: 0000000020000600 RSI: 00000000200005c0 RDI: 00000000200003c0 [ 111.681616][ T8955] RBP: 000000000073bfa0 R08: 0000000020000a00 R09: 0000000000000000 [ 111.689669][ T8955] R10: 000000000000c004 R11: 0000000000000246 R12: 00007f246d5d86d4 [ 111.697900][ T8955] R13: 00000000004c4056 R14: 00000000004d7688 R15: 00000000ffffffff [ 111.707775][ T8955] Kernel Offset: disabled [ 111.713355][ T8955] Rebooting in 86400 seconds..