6:41 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4c, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000110000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000080)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) getsockopt$rose(r0, 0x104, 0x2, 0x0, &(0x7f0000000040)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) 00:36:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000880000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1420.059014][T28082] FS-Cache: Duplicate cookie detected [ 1420.064710][T28082] FS-Cache: O-cookie c=00000000a1902e7f [p=00000000a8002570 fl=222 nc=0 na=1] [ 1420.073568][T28082] FS-Cache: O-cookie d=00000000c744bfc3 n=000000001427d30f [ 1420.080813][T28082] FS-Cache: O-key=[10] '0200020000807f000008' [ 1420.086952][T28082] FS-Cache: N-cookie c=0000000070cf6f86 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1420.095662][T28082] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000031107155 [ 1420.102888][T28082] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:41 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f00000000c0), &(0x7f0000001fee)='9\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000180)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000100)="2c40970142840e13e70ee2009f8205bc093a082e6597cc990358e2000f8cc2d9de5e9c9d509c662cdb0878232ca2e54b6fa5eb3df93e24b7b8", 0x39) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, 0x0}], 0x1, 0x6e, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x40103) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000001180)={0x0, 0x0, 0x2080, {0x0, 0x6000}, [], "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", "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"}) 00:36:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:42 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e24, @multicast2}}, 0x2, 0x5}, 0x90) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r2, 0x80000000}, 0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f000048fff0)=[{}, {0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000080)=""/1, &(0x7f0000561ffc)=0xffffff13) 00:36:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:42 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0xc0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) r5 = dup(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0x12}, @in6=@mcast1, 0x4e22, 0x54, 0x4e24, 0x8, 0xa, 0x0, 0x80, 0x0, r4, r6}, {0x200, 0xfffffffffffffffa, 0xd963, 0x100000001, 0x7, 0x7f, 0xc96, 0x64f73b76}, {0x0, 0x401, 0x1, 0x12000000}, 0xffff, 0x6e6bb0, 0x2, 0x1, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6, 0x2b}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x27}, 0x3500, 0x2, 0x2, 0x200, 0x4, 0x8, 0xff}}, 0xe8) write$FUSE_CREATE_OPEN(r5, &(0x7f0000000600)={0xa0, 0x0, 0x4, {{0x2, 0x1, 0x4, 0x97, 0x44, 0x4, {0x2, 0x3, 0x0, 0x10001, 0xe0b0, 0xfff, 0x1ff800000, 0x7de, 0x5a7bf30c, 0x1, 0x5, r6, r3, 0x9, 0x3}}, {0x0, 0x2}}}, 0xa0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:42 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x68, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000200000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x82000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000100)={0x3, 0x100000000}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2c0000) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000080)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000040)={0x11}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000dc0000)={0xffffffff80000013}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000939ff4)={0x2000201f}) epoll_pwait(r2, &(0x7f0000dc7fc4)=[{}], 0x1500, 0x0, &(0x7f0000dc7000), 0x8) 00:36:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000001100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:42 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="616f9736768b2ca632400f59a366d9428c1b33ec6e988d96257e74b1ff9e4f2124264a7b9a4ca5473c63c55e9d752375f3460dad59550fdd0b3f5c1220eac10f499dcb48db0e2c0b02843b9b60e65f893be220989e8aad6690161cd34ecd8faf06183ce9d4d101e15f248078e1584c24a5fa"]) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x4000) write$FUSE_STATFS(r3, &(0x7f0000000180)={0x60, 0x0, 0x2, {{0x0, 0x844, 0x1, 0x6, 0x7, 0x1, 0x1, 0x5}}}, 0x60) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) dup2(r2, r0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x8, 0x7fffffff, 0x5}) 00:36:42 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x2dc) syz_mount_image$f2fs(&(0x7f0000000340)='f2fs\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x7, &(0x7f0000000b00)=[{&(0x7f0000000440)="dd813bd40f87e7a26b39ab7deebaec946e6ff2bc486d2e35d3fac0d12004b21e518d4684254d049805f4bf7eed243291cea25b90a19c7209d979934c9dc487e04e9aab764c40343ee0a3956ee534bdc2f3708a407a4177c870206a2fb9a963281c51989f5dec53526d695834b3ab9eaf9a3eedfee1a6fbd433ae87cbb853eddf239f26a25e95d3201a", 0x89}, {&(0x7f0000000600)="be33a158feb0dffe3607fa131f7def088cef117b8ddf2386c348e93d792c6e01f9cb9041fa425c931047a661b709df772411f3b73945f0ee35a170f589eb6aa014010752a64b50a8b55f1e93bf6eb0c1d5d5b619b4f7dff8f441ba321a9a6db47943368464ef37b495496ce3a82867f0c0623e08c2a283d370c587abb666b81120a9453b37e1b308e0b20100557ac75f23ccae444c1eb051a3cd0eefb47e4d15d29cb4b3c5bdf03a1955b473e56db721c88402c39ca89acf29f842df2b26f3bc09b0944dab77600d280d4e6e831d0ae3e288269514087803", 0xd8}, {&(0x7f0000000840)="79b343b865b468732087a10f642b2829c200026b03e1016064791cbda725335b95f91054a9d313ec0a7c58c4c9c6d0e883433cd334239cc8ee5ca4581b1509785b0ac0727a38d5ecd3d480770da1948506abc66a069525eee0c70d2aa3fd29dd6265c1f79274af31032cb752", 0x6c, 0x8}, {&(0x7f00000008c0)="d6be7ef62101b2c4bef2f137988a0ff05841cfa07dac41285045e9dbbceaa1535374912947a08502eff3b0641b5480351bd111b3ee7454ce559bd521b8e502c90479e40f90e1b9acc5e1d922151a991256f835597a81d0bb8eb2bb8595a438ed2397f04ed0d1196e65a2a6d442a7527d481896e7fbdc023c11171aceb0d13d4485a3d4931acc47d38a3c296fb17953d5456f03423d4cfea7e3bcdcc9bbbe07fac7deb2b9007914471ffc895dbaf7645b930ca0530b3ade0c68", 0xb9, 0x40}, {&(0x7f0000000980)="ea0852ccad12c7aafd8392dbf3ce7d4e769a64380fc7d412c4793195aca25fd0678c285a3c2db42bb93f441f4599c44cac91f9218e4ed8e3f7eb0901028b64562848d04bc2846f245bf26896c68611d56f5df55809add8de70e03f247a206ce520f32741f42b66c97257dcb5b532944db6eebd57e72c63a6fc90dc406573ec551602a12416c5c4de8640c1cde70a1cabc535b74540d73f855089e3eaef4f2b0bf0", 0xa1, 0xd729}, {&(0x7f00000003c0)="e86e7288862802651b86520ecb0e", 0xe, 0x8}, {&(0x7f0000000a40)="1aba6ba28ae7c87dd2e0d07a8380bc85889cfa7f49d3e0b6f1ced545011a928eb393e01a0c97973a2ade8e5abbad8d9ba3f41acec9ba046a407f827b671f2fb43b22353220ec93815f691d5ac3f331184a157ad9fb814bc7086675631a649156ef9e4b4aaa9febaf31f3e5d865071438dbacb0fb4b91e054e2014421b09ca64d0df5733d4bf6fe16528002115635376915524ca4874d36f44375acd29abb3572374c51fd62c8ede7e93b4ae4ed9ba4bb0dc6fcc26c38075df75e", 0xba}], 0x20004, &(0x7f0000000bc0)={[], [{@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '/dev/vga_arbiter\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'rpc_pipefs\x00'}}, {@obj_role={'obj_role', 0x3d, 'rpc_pipefs\x00'}}, {@context={'context', 0x3d, 'system_u'}}]}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x6, 0x0, 0x80000001, 0x3}, 0x10) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) fadvise64(r0, 0x0, 0x401, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000180)=""/223) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/98) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000100)={0x2, 0x4, 0xfffffffffffffffa, 0xffffffff, 0x20, 0x3}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:36:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setsig(r0, 0xa, 0x13) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000000000000000000000000000000000000000000000000000000000000000000000000000001000"]}) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x400, 0xfff}]}, 0xc, 0x2) clock_gettime(0x6, &(0x7f00000001c0)={0x0, 0x0}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80403, 0x0) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)={{r1, r2/1000+30000}, {0x0, 0x7530}}) 00:36:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x7]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x204, 0x0) userfaultfd(0x800) close(r1) 00:36:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000008000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1421.597085][T28229] FS-Cache: Duplicate cookie detected [ 1421.602633][T28229] FS-Cache: O-cookie c=00000000aa34433d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1421.611608][T28229] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000059a9c492 [ 1421.618974][T28229] FS-Cache: O-key=[10] '0200020000807f000008' [ 1421.625109][T28229] FS-Cache: N-cookie c=000000008e72452f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1421.633779][T28229] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003738aefe [ 1421.641027][T28229] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:43 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='keyring\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x807, 0x4, 0x2d, 0x7, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffffa, 0x6}, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000d80)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000500)={0x1d, r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000017ff0)={&(0x7f0000000080)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e19a2b010000037dc1250300000008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000010060000000118fa1efd9b0b"}, 0x48}}, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/120, 0x78}, {&(0x7f0000000280)=""/149, 0x95}, {&(0x7f0000000340)=""/231, 0xe7}], 0x3, &(0x7f0000000480)=""/42, 0x2a}, 0x100) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r3, 0x401, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}}, 0x801) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40000) recvfrom$inet(r4, &(0x7f0000000180)=""/96, 0x60, 0x100, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$VIDIOC_G_MODULATOR(r4, 0xc0445636, &(0x7f0000000100)={0x6, "7504f1b41cdc2e3fb379afebcbe9cf96904e36080111bf0e700383a6d1782b98", 0x4, 0x26b, 0x0, 0x220fce1da1b22389, 0x5}) 00:36:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000008800000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:43 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000000c0)={{0x2, @name="c4f034f6418439e25aebe07aaf8354399f8be719d2b7063defdc8ed685b7f000"}, 0x8, 0xfffffffffffffff7, 0x3}) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:43 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6c, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x9]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000ffffffff00000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xa]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:43 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r1 = geteuid() syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8ee, 0x8, &(0x7f0000000a80)=[{&(0x7f00000002c0)="32175d4d6438abba7981ba4aa98967d3943c9cf32d667cb46beffae0a043bace3954c0f71a471a3e0ed966a0b5bc3df95847d47fa6a562ac2afcb0a897f81f3fbbe1005f6c314bba871f687b4fe831cfd76f5b19d1748c67187fe8ec44be0330e36702297797f146a117a321406ce5bb6cc65cd33ef5c74dd8dcf4cc65b32faad493c8524b8dc3c7d7f49a2c989338f9963e4017e3dd3b10fc0c8e13472db1eed3afb6befddc423060bec80df6899af26e25b0b4cbb176934f26c7b8257a79995ecda5d5", 0xc4, 0x9}, {&(0x7f0000000440)="edb72ac19a835baa2ce5ca7b36e5b7fcb714a7e9643c76f7ee8a510b7b56deb786ef06d9c6ded19094db42376f9daff26385ce3ad0d11cbaaf580cb5d94202aa2ae29cec50602d96a72144ef9c894fc7bb643b171a677556a98bc5a1a693fa49b58d2ddf5ec353238ab21fb25bbe9155cdbfe571781c8d7af46c3927c1164857739bc9116a5536bbfce0b7f95321fc8382dfe03f216e22b906b8bc23bd5afe57", 0xa0}, {&(0x7f0000000600)="624ebb57ebd448e63954bee6baf2b0df04a7c93d0b19cddbed4b019d1c44fd21374f9f8282073d83c634e7cd056f45e83ba2dfd0c4244c46f17bafece8beb4cf7222f70439398fe939e84620fc3fc1f28ac2842c805086902824bf867fc1a02ca90e3cd4450ad0528a5eb652cca8d1ed66aaf71586634ad89344480f535726d00d0abe63d5148e3240f269f3b7a78e66399a0e", 0x93, 0x5}, {&(0x7f0000000100)="c51d8be45fe156b2d514f6ec91249c2927486802bab6d3db", 0x18, 0x1}, {&(0x7f0000000840)="b426204fcb11ff68dee27175aa76c7082b094bd3d1dd57f613f85e439191194d76fc219141ffbe2c729b58f1bdaa37da638e4481b2831f348b7173d5db472c0c47b4d35d0b16e76d34718fac54def791af2730329e8b7d96d596faadae86ee10fbe0133a845faa4d2be936167e84854420dcd826fd80a481eb3c0926a5fe161c199ddcdea1010d176b38dda33533363ab21dcc25b7f8e9bae94ada50330a79542bdb68061dc5c9b74c7a592c7b5d8ed7ee315355", 0xb4, 0x7fff00}, {&(0x7f0000000180)="f1ee4b63e61204498732268270d9ecda71f9fd2607dc8f0ae6009336d25640377c03e6", 0x23, 0x7}, {&(0x7f0000000900)="720444999a0c933fb7eab104b655898111a2ef31125354e8e2eb5d64e2b8a54d052c72a5a94c0b9e19639646ba9c51745a39502c3065cde1f1e81c6366b89a2d82960e36f417e78746cd3d4bf157cae14cdd5b9ce88dd3c6b4ef71175aa5632328fbc39c96ac6724611c48b4b4a2ad0fdb0489f60a6c25700dea8456283d9c4830548b03", 0x84, 0x7}, {&(0x7f00000009c0)="b479cbe474ec007f6ef11f4f558b310ee1f9615b7b3e5e06a928def65c3a0bff98a8b9c93a2992dbfb82278f3090fa608705b341a5bd93c08987c8600f1e8c480ac58f06c36648351ac75e2bf4332e758db81e781d08d9a0c59e66f0f75d904b22b5e31a4b5773c962559bc75ab8b2f579fe870e1f3a221f0b3e86587843a7185701a031ccd5f9956dbe5993120057175b12f32acf8be2f47a8fc8a62090b4d8c4", 0xa1, 0x8}], 0x100000a, &(0x7f00000006c0)={[{@show_sys_files_no='show_sys_files=no'}, {@dmask={'dmask', 0x3d, 0x1f}}], [{@smackfshat={'smackfshat', 0x3d, '*trusted'}}, {@uid_lt={'uid<', r1}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) r2 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x6000) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:43 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="c313d25d7acf6daebb082d9647a2561c69d2234b8b16f6e35a97b1514a799be6dbed04f51862693e44e850573a26727c39296ca84cddebf5a07b6f8d052f14994b48a1cb9eaf2fba2248a737553367f4e8c9a8c9d33c15d9c0a974fac1bd1ce2974adb6618ca75f30a2bd622ebaf051df8e6e714b0ec8fe39e2b028b9d8223de53224e9235220f45734f7061eb2e551747e5b45b7d13a9d0e9f7a7"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xc]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000200000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:43 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x74, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1423.316357][ T7] device bridge_slave_1 left promiscuous mode [ 1423.322586][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.375388][ T7] device bridge_slave_0 left promiscuous mode [ 1423.381617][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.600654][ T7] device hsr_slave_1 left promiscuous mode [ 1423.659834][ T7] device hsr_slave_0 left promiscuous mode [ 1423.728207][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1423.742198][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1423.753524][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1423.791935][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1423.882544][ T7] bond0 (unregistering): Released all slaves 00:36:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f6, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) prctl$PR_SVE_GET_VL(0x33, 0xce5c) 00:36:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xd]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000001100000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:46 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) open(&(0x7f0000000040)='./file0\x00', 0x88000, 0x104) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x100) ioctl$UI_DEV_CREATE(r1, 0x5501) 00:36:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="33b194c47fb7c7bd122ff1f784bb7dd08c5c91571f4f9b0af1b72a43e5c3149cd92ad434a11f268193f866ed3a1a77b69c1de70f42d6f51803013ab60809982e64ff0b722718301590e96fd93e33529988d4960bfc4d96dfce6f574a397103b0e0c0e5f864d616f17dc8cc8cb37b39d75815b9653e681f89f79a491af068429e"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:46 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7a, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) sendmsg$nl_generic(r0, &(0x7f0000023000)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x27, 0xaff, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:36:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000008800000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000011000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1425.516211][T28387] FS-Cache: Duplicate cookie detected [ 1425.521664][T28387] FS-Cache: O-cookie c=000000004fe3b99c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1425.530705][T28387] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006a2ed053 [ 1425.537924][T28387] FS-Cache: O-key=[10] '0200020000807f000008' [ 1425.544430][T28387] FS-Cache: N-cookie c=00000000a634dc2c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1425.553095][T28387] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003b28201e [ 1425.560329][T28387] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:47 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) sendmsg$nl_generic(r0, &(0x7f0000023000)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x27, 0xaff, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:36:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x11]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000088000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:47 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x84, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) [ 1425.861514][T28441] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 [ 1425.913168][T28441] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 [ 1425.974214][T28442] FS-Cache: Duplicate cookie detected [ 1425.979707][T28442] FS-Cache: O-cookie c=000000004fe3b99c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1425.988833][T28442] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006a2ed053 [ 1425.996070][T28442] FS-Cache: O-key=[10] '0200020000807f000008' [ 1426.002162][T28442] FS-Cache: N-cookie c=00000000baab1133 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1426.010879][T28442] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b0362913 [ 1426.018098][T28442] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:47 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="bdde917d82bafc911e5155fcb40bb39de2655d0892df98e4220e65254d24dc06866aa30717e535d57fa35e256b369defa9222c56b3246ed201f58e18e94af8a6b409304fbc3768a997375d7aa546bc6d808e7da6e1dad8498615a96246fde30c1a997a7a48014043b64bf9df3fe4b4cf78ca98f4b092e430d257a93cf5b2e5a9b5fd1a18eb40a41c9ebe22a27a4cd2b0467608fcea5e1a66def04de88b241c96bf6f5cd0a96f865a180ce26133222bb926bcafa2909e8f4b422d6c958a6b97f6cb"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x21]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000100000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) 00:36:47 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x59, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x7, 0x3f, 0x3, 0x9, 0x0, 0x1, 0x2000, 0xc, 0x7c0, 0x0, 0xffffffff880ad90c, 0x0, 0x2, 0x81, 0x6, 0x800, 0x81, 0x7fff, 0x6, 0x4, 0x3, 0x8a, 0x7, 0xb28, 0xfff, 0x9, 0x1ff, 0x7fff, 0x64f8, 0x6, 0x6, 0x5, 0xff, 0xb504, 0x8, 0x9, 0x0, 0x101, 0x0, @perf_config_ext={0x40, 0x8}, 0x100, 0x8000, 0x0, 0x0, 0x40, 0x10000, 0x4d9de17}, r3, 0x3, r1, 0xb) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) fstat(r1, &(0x7f00000002c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000180)=0x2000) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) [ 1426.139886][T28472] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x28]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) [ 1426.250735][T28487] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000200000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x29]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1426.424075][T28499] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:48 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x236, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:48 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x100000000000000, 0x0, 0x14) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1426.713463][T28513] FS-Cache: Duplicate cookie detected [ 1426.719049][T28513] FS-Cache: O-cookie c=000000003d90b4b9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1426.728077][T28513] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a8f41a84 [ 1426.735354][T28513] FS-Cache: O-key=[10] '0200020000807f000008' [ 1426.741553][T28513] FS-Cache: N-cookie c=0000000046e0c376 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1426.750260][T28513] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000cb557644 [ 1426.757478][T28513] FS-Cache: N-key=[10] '0200020000807f000008' [ 1426.887826][T28522] FS-Cache: Duplicate cookie detected [ 1426.893239][T28522] FS-Cache: O-cookie c=000000003d90b4b9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1426.903118][T28522] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a8f41a84 [ 1426.910450][T28522] FS-Cache: O-key=[10] '0200020000807f000008' [ 1426.916586][T28522] FS-Cache: N-cookie c=00000000cc9549ed [p=00000000a8002570 fl=2 nc=0 na=1] [ 1426.925294][T28522] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a9db07fd [ 1426.932500][T28522] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:48 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) socketpair(0x2, 0x0, 0xfff, &(0x7f0000000040)) accept4(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x80, 0x80000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000640)=""/209, 0xd1}, {&(0x7f0000000340)=""/164, 0xffffffffffffff93}, {&(0x7f0000000840)=""/201, 0xc9}, {&(0x7f0000000480)=""/14, 0xffffffffffffffe1}], 0x4, &(0x7f0000000540)=""/29, 0x2e0}, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x8000000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:48 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000380)="f8495f1a0b8060112d4d6340d9eb7c8fd74cb89f91aa5bbd", 0x18) r3 = dup2(r1, r1) getsockopt$nfc_llcp(r3, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x80200, 0x0) setsockopt$RXRPC_SECURITY_KEY(r4, 0x110, 0x1, &(0x7f00000003c0)='\x00', 0x1) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x89, "a46be0b9267f491af62b1ac334629d7abf117d0a662f4397b0989727a4abf9946978bca94c764ff564fe55685f203fb68db35ca5724e166bac0f30e6b5adb11a5acc9e38afd2ffe93abda61bee538b03bf4841c65e46c8e07a378a2e11488b86491abe3f7b637f30b0185585aea390835dcdfa171e6f3b534459a45c4c7bafdda37d4751b0ea55f0f5"}, &(0x7f0000000180)=0x91) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000001c0)={r7, 0x48e1, 0x6, 0x393b80be}, &(0x7f0000000280)=0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) exit_group(0x1) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000002c0)='syz1\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r5, 0x5501) 00:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) 00:36:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000001100000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000008800000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1427.111749][T28551] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/164) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000001000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1427.328375][T28572] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2f]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:49 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x278, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:49 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x10, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x545000) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:49 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000002000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x33]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:49 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) sendto$inet(r2, &(0x7f0000000640)="19463aac335270428aa36f3931826961551990567c264438588eb5e3ecbc42cb25d766e1a8f3b53c819f44b7322f11fc7ed3b255f48d390c6f4ea413ba89825fe66cba9155e01536a456514582f053ea58048011b93125e1f1fba34106ca7999e241a5800dc6e4992de08c5ce628e720c5f970191eeb0a636ecaff8d39680c2c6fec63ba1a514e5229117606a7518f378121ef8cc5c18b5fc1930f298ebde638de77c9a895d2dc62b599d4144529fa1165a6730fb0e0f54dc5809356ccaf01eea24b6c3fbdaefe86f8", 0xc9, 0x855, &(0x7f0000000340)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x10, 0x800, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f00000000c0)=0x6, 0x4) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) uselib(&(0x7f00000002c0)='./file0\x00') 00:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3a]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1427.757281][T28611] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:49 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000011000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:49 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x501101) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0xfffffffffffffef6) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x32) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) lseek(r2, 0x8, 0x5) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x42100, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x2, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x801}, 0x8000) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x5105, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e21, @loopback}}}, 0x108) 00:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1428.064943][T28643] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000300)={0x7, 0x1, 0x1f, 0x304}) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x680, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x10000, 0x100000}) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x80000000009}) 00:36:49 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x284, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:49 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000080000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:49 executing program 4: r0 = socket(0x13, 0xe, 0x2) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:49 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000088000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1428.383482][T28685] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x44]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1428.532517][T28690] FS-Cache: Duplicate cookie detected [ 1428.537999][T28690] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1428.547048][T28690] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000032066e18 [ 1428.554234][T28690] FS-Cache: O-key=[10] '0200020000807f000008' [ 1428.560396][T28690] FS-Cache: N-cookie c=000000003ede4b3a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1428.569158][T28690] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000e759a1fa [ 1428.576407][T28690] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:50 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000ffffffff000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1428.600941][T28708] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1428.742783][T28720] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:50 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100000001, 0x10840) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f00000000c0)={0x7, 0x7f767f5f, 0x3, @stepwise={0x20, 0x100000000, 0x8, 0x5, 0xe6, 0x6}}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:50 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2e0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:50 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000002000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:50 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L-', 0xfffffffffffffff7}, 0x28, 0x3) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f00000001c0)={0x891, 0x7, 0x7fff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r4 = fcntl$getown(r1, 0x9) rt_sigqueueinfo(r4, 0x27, &(0x7f00000000c0)={0x1b, 0x1ff, 0x7}) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x1000040, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000002000)={0x2, 0x0, 0x2080, {0x6000, 0xd000, 0x1}, [], "1d7b55506f6eef852238e642513ae7b667d3ccd6e45ce493127b4c9919c262d027fc0148b90bdb9c03706177e7491f96d4dda7cc96ed8ac098af0e3bde6e49b577b8dea21d221b490c98ba2e96f6b3069e00ad7a95579d24f97d3aa5795194475ba0e0f2c733743030bfbaf0ab21b260ae954863a8b8eda4ef234926abedc18a4872462f2ffb540af0520ce314a72fe54aeb3bc71c6170f812a0de77c0c600e3adff96d86b44f4eab7414077a5f71a1f725edb1aa45b8b1fa0b7ed445e0211443327fd091462d159a257a8dbb95818b134e89685a1497763a4d3ff0e380721aacb294837fc758874fa3250f5d8b48465deb1f5db0738d9334b9d44aab562a1cc3346011a7e7e1bece041cf0dec660d1918afb29dcb3e1b882987d38fa8ded69854882da0fed02c57f0f2ee66a48417520613d44987c0e75aaf4ebd5a5e67cbac71ec83068a6c144ce5dc8096d52ac15abfece5eee5d86e339a6b2cf4e170640e64b472bc6b59315bfa93a61e335f4a0fb41bcf75cc820cab7aa8e93045716b0277c03f0ed9b1a4c024d52bdd1baf04a22a082e54d3049a9316d80f7f1e20fa81ae9e9a1006f4652f2fe25bb5dbb5599c498b4052b3cdbc9bac5e8d471e84459f3b89a3532e5dcd1f917aa93b753deec7d228e17a5ecaf81c4ff0d14bcf40fb6448a2e2a2e87fe52b0af14e05719f129d2ae421680f2945c7ef90574153bd8ad65314ad265f3b49b9929e97bd879c5227a36c5472326630c6ebe091f4155971554897c0db106739f2c82508b98ac2863c91022492d237301ad92b5e3e0326594915f816ffcfd270b1eaa6ee017ef28b1cb4433d6734c11f344fc07aae707282dfd5143d555dd55d916c81ad7e2ec927cbe1308a571950ec43d7462cc0e09630710bb5638880a71f0f1bdb1fd07a64073fe01f8cd5fb63713d6f32100a4c64657b5b08ab4c76ee4da62cd106a675d22798815b193068a3185eac6988d4066ffdb53c297e078528feed5b664e3869d1e4f43483ed4b0c1b01bc43dba0542937c7363918581075b3d5e86f5cd3e5f3ff2645508369fe035978f7cce8680ecc7183bf9dc0bc8cad0314fc093008fc386ddcfd352f2e5181ea5aea7080e2f5bf99e1864fa17569d504c0d21d93bc4a4c2d0aa53dde1d622488cbddc6c73441c1ab6c5265d93921085aab2b4d2a2037f2888c37fa0ad31e38a906bb4e2e51a3631fbfbe63b65dbce650ae00751fcd66147d8c9b8f87b10994795e87183f10565c05627b530fd0892746a8dd35c5add145f8e83784e0feeb496801ce5ed9367e384511792b6326174210b05619f0c9e5340ebf246840f79124e522e71159c5e817d9e08b4cf318848a99ff13f15388bb34507fb1d00c9e4a8a91d37895449793a9d4d45cb47492c6fcb0db26916fb9bc042ddaf23f686d2b141047ebc17edbf105ed80d4e3eb9470f36988a7da279e43c3260dcc4bdd127059699fc15a967827817d0c1787d9825dae4f0aec6419bb5833ae60b3ae301bd433cd200fc2eede8b8b47925248208005e209b4d5ce14cda5e0d34897368641484b4d219bbca46b73f47d5fe04ca730335981629859e5ecd840b646622bb7288f2216179ae00613e2c085d2d4324f63c270cd6b26ad21f99a19e341f37e78a2a3c0586081089403b1f89e41fd2f9bdfcebdb91aec744ddab570c362c6bd69ca5bd96144ff17949e3a58b7ed9438a596556782768e69bfd8f4b23ea5c2bcd74a31d477ddd65a1e13685164c28a6733941ff1a9a1ef54b51411f8b114b47c41498d2a6eed4b59a27906216aa835fbeab4e31a62b674bdc72451c32d860130fd1bfd140bc7351062fca4b3c1db4af6c9e498985856fa28a9cee1f86671419b74258f78b00c4dc8056ee48ffae49acc0741918709b58f6c95d4d28ab18ce2d6b11f845e5a0180be37229a166493e557f213ee4c604a2accc4a1a4e1d17b950f7af8b21eb46bd2183cdbab71213c9604a120fd93e3e8342d9c506010ca2b10b34fb2874a3baa32eee162ba458635a6cdb79aaafe6c83aeac29cbf63984d53b0703b91777c474681bc6f03ed42f82c57c1a25b0ab8862b91fe4fab3b7e4527c1ceaae2bcec5098ece791535f914baf9d28c6071777d55129c08ef58613a9c476a651fdd87f27700c98a334d57092b3f17a2588b9edac5073b2288ad14e08e1076f37cd8c93c4ac8cd82b03c2ba4b9d3f44881a696131fb989981e30f53272ac5695136e2a6cd1ec3ebf3d78b6ccc326b52d3b223f54d69dbc81c1731269ed2402393256a1cef5760e4786d9c00b8570cd6b2112eee701dba85c7ae6c02431dec26a626c58eb21a5c145eb2222ede9026e92d8a60128a1d0ecd4940e59d1d5ebc61f7554cab3f3ab230c28dba7a31c733034559491fe117947bb86438d8e1d6b2d0f00e6f720084052189dbf74996422e338361399d95cce4e079e31f41b91ad7ca4aa48c7c32242c033c7ba398ab984cc80ac1ff83aecb6afc7142e183a083971743021c9d8ff5ea6a0b9e7f7a337cbe24a33dc97a2dfec4da43fa410b9d0e8a8e2fd32ede2dadc9bda5ce0650275c7b60c48e35a3fcbb387a676637bd06675aa3e7a561e73ea79d79c017095b8bdd9dfeab40417cc5c25a253d13529ca804067febb65902d9f30403688e2ddba9ee80fb71c4db85842b23e32984a07460cb56de968351eb51d113ea4012ea89b6e28a7a702fbc5afe6494e8f26e489942e8477932151570d7669d55bb924093e6ca1f207b1fc5e80435f41f7deb38c3385f22550b9b4ee927fcfb06a559da72174745e40fd4d46424ad505f4bc7e91ef2e749cdbeb54c705ac750a2ab30f5230b1964e9da23e2bb0f84fdf1093d885649a6dd47f07f75aa36dda9711825ab44ee1d5f00c1e2e8e4d86ab877196f36ccddf3fcf9c62aaa10b0afab23ee214d3937e4c03ce93a9ba4f9cfac1968d14c5b77e91b1643717a963ce992c9ddb707735c939020bb0f1d373868782c7f563aa31ff273fffc83cf78fcc25b0d5a1283f550a98e2c08a593f5535db52c8e49cc26ccb15dc8b8fe68902201034ef6fc4eec01a01feef8fff493d6ea6aa5dd5f7611b47c4bdba152d67969b25098b07ddb14cbae4b2b2b661a52eab33eb96cecb8df6636fda255e52ca53f751a7c8d19fbe12a4525d4762a79cf06e272c2b5116c2d9ff36dfc1ad563968e70c1af117de6c7af29d067582ec7d68d698499f380ce1271c78b5c4f26df21e5b1b5c07eb3b7ba1d8cba12a1498f56c1cb4961e5510e8d1ba0ee4f1f2164e978dd9c325310b8dd1efc27805affb84fdda5901516fd7306541fbf0ad165a6cdd915c2d8951c79e7f3c4b115d833051951a7d6141cbf4aa806f3bad322d7acad3d12c273cafec07e2fde27272db5fded67b1acaf07ab1e20f3db27ae0f2773c1932d0b6afa9499f37338121246eea2555b5a8b6ab52ea945535c53f7845ae7234b74642accd6aaf1ef527af71bf2df9c3bb3d78dac131a7328c22e36e17468f455eeb697379ac852cdf7226f77216aa0c0536844012d8e5cbc8113cc67c805db901accc2e59f9b13101a6dee2bc72051fb1369b41d5a0739aff693028c6d9faf3d2abf302c3414b4ec80e8067c050ee357e9c133bbb786e0194fd1b5bdf032b753bcd1fecbbfc315c46194fe23e3958996c93ce80a3c2fabb458c9d635a77013073e483b460c208e1fb909892eb420b652d716cc162d62b39ec10ca1954ded4be70b18fe39b80428c565f47cb61bcc7507e599ebe301bb9e621cc7fd41d7d6be9d02e58ad054d45615c40810e8aadc7d813f46743c36e001dc9e4e6593c174ef3efe245921bca1f5d8e38d1f06a1921f9bb3a0d3810789caf45342678aeb7bcc6e96c131a030186b2ca6fe26dc8579cc421b1b44d103b185141bcfdb6ddfb19cb1d3925f304009900ccc700ccc5c6becc5fac0aa125bb14f9f6be61f40f2409a144bbc2a31e87ec2d7eb21ce78a6b08a626bd42c2cd5138aebda333deb98ba3e5872565e4da798b1354f2447e027bf3999c68f870027ed6309325dafc3977a13fa58684e55f103dec584c012050d7e0d7c9bd84bcc142e92459b1548bffdd616780897858fcdd7804058e3bdeb24a4af17306d0e4f38352fd9b3b513ae1af53552a427fcfc9bdeca8a999d22fd0a27b4543d27fc88435b2865c4cee9768f78a5834417db80a62ee3c69db426a8a8dad697150231186c64a8f983b6afe6a34ecf326e376bc25175b9992b7a702d88c8e38e1b35c8dcce611c4654550d5e50471cf95d7605d96af734cd263e06ca00251ce73d4e578dd9856cfc50b3f467a38fb7612a259d80cd5d90921a630212109e7c4dfbd9584d5c6b978506220342d1ab167929031bc6f537e1820e39aa5f46498a81c0b6577bdc044542490b8c1ff6034f5466896526ab4afd8d77108976f3f97537541c75985d2aa3c568974c7fa4acbb383bdc048fd0c90b233da1814dbee13df0494c433d16bdf0c0121e91ae1ddbf86be92f38be124e09816ea1e8f733949bfe8f8c32392c478323547fc2da6d1d3ee2ac786e08a8d17ae16f5dfd9d9745cb7c9a103df8e369cda4d33f497495e4c1d1a0133be91c953a1eee006ccba32856b4dc4a2a6d8dffd7c66118cc57f44765f67396161db11476d04e653da82acdc85c3fc1b24cc97cd3c30b9bd1d84eff640b0b8660142fdf5e40796fcaa609b31b6b01fdb6950a8841f3e481edfd8ded0d131f3d799855c7884e832cfe98bcadfd21846dd41f887a4c0d41e9977a10e2fb5e242fe697857c0101b255c7e88bd2c93a1500abc0d7faea597386518bb78e0dc0e37e5e6e1710029ee7270ff3302f1f170c6808e9a36bb4e5567b8d2a07ed39a0469799fad5c7e33ff469fec95d4775cefb603f50ab85474bef0e757071579ef456ddd2333cfb0d17e36674d0487a99cacaf83472374b2705f6a80dfb73bdbdd4142f900bd073aa2688812a7e1934fbf24eae62742e3c7eedc3f1ae87c0d87afaecc946b64c488a71638405c68fa8aba31e702e6968e97a3baf37dbcd20d0511c641b52687bad33618732347aa31586891d4c9edc78d8c8e20729466de4d8f579a26dc0080ab4216d7e64bf66c6717b1858d81a37f9720ddc93807b5edfc9a75aa79a474f06bd37723b58a3a7af3dca289c8badc01ce26851c5b6bd7b683333e36fa281691e689cf4bc75a8721a33dbf99a4bbbaad9aea508b0fa69e19e4698382a183efe2184edc31f00dad363827f0a66ae0365ff2b0a3c4b8079f4cc9cabdc586096daab9902be6c68857969f68ee300dc762f5dd0c075af3fd6197d03a2d5a6cf78154b426e54b787f5ccdcb1adf710676ca6c9d143cc451a2f484a11a0d521776c84b237cddd9fbcf8e21c5cc70a872ef2730ddf6bdee1365e72e3be9b481b8c78c73ad3cad999acc57312fc5cfb2ca20445c249421690d0a6ca6f74e7369c5935bb71a2e7b6e273e4f9863b8dc1b3ccdb4df7e28a92763abcb3be2c67eebe6ef5cb4c60525c41d138a61ca815d71c59e700bbda80430e1d20e2a70348d5bf0c9fdd9f7b32d1b1905cb73e73ae45e116379bf1606c7186aa73365f1746eb3713d4116251ed2835bf83269f9b782ca5fe27b7686d922facb68afbb65ed0a32a5d3588d1f03ccc820368f5c785d6b0ed04216ec585f28644cde43cf777b762615f4a8d4f607fa79cbf2306489c2abf4dafa92b70f027c4d034a1fdba1661f48eaa52427ebd01382643d38c9fcfe09c4550d8180a0973acec052d7a39bb412dd869522f6e0ae75f355", "d7d895640400eb00251e9c181a7a84930c0c0711accade4b97c7fda97cb4ec00f6b6735e4fecd53e7e090bbb880fba5d201367a8b0a8317868253fe268bf13c6c59cf865edcc86ea4c6ac01842dae59866dc489e27eb252adff4c07854297d4083d8c56124dd918a6685d39fb07fe319023fd40b3a11e425022cddad6361139a7ca3f9fc3414bcd93703e80b8b10e62e036e61fb6ed4d3e64afefcd78506e2a2970877d2ed81d527b4a4202734f8ec1290b7936637e6d4fd7528aaf0bfd300e70d37141ae2d0a142bf47930920690c15ce0d444d77c9dcab06ec346d5ab0805703910c8928210416d88e94cc89038a0293bac48fcec2b73a11cc7d015617e9760c8ae520a4e98b0002e80968f1b7f83aa90532025c86549f270a691497774850adeb7e0d8876377b5fd38b4e4c70398e1a04098ad51838f9bb5ce2068a1631802a91bcd997d7d80f6f251353484fee4fb07a1db02d7a3f3427fa045be59a0b155e358e12bf6b484abf005dcd82c0cf748ef6428af48095acb9e1f3fbddff1847d1de5b10d9eef1624eab5440592f9cf561fb8edfeb91c982de5cc7061e1671b1b061e02699dedf918e4f2edeaa943053d62563679bea5bccdae1bf392d006bd44c7415a5cab1a6ea033c401597f239f25b7bea855824e6c66191cbee0252d305cc50d7a32ff240638429e6ffd5096ce6450dc4b15d81af2319a557b502195f025ffec894d2e5ae0f9a3931c9e09ae760f183b0fb144dbd8108fd62d55b221b82fd55f90cfcee3e64a2a4576d5eb752e9b6cd3369b2ac9e224c7356ef8c8539358c24c85e985699d990f52aa25962bacc353d6e426ebaceb9bde51968b4b2bec62745de22b0187b6452c3121ed56a2d172265473add9eb6e011bcaada826fc0c52b02549277cabf13b5c59c7c0a985d385b39870bb80b6759878e8dbc006df5619259617bac717c16ed9f7509e004aed88df8000712bf09bf854ec7830727d4b32c9c8688452c75c152ae8170b811196d1320804fb6aed7a817e0eaa476aa8cb59555771f9a14fd1eca4a9c56ffe881d6732e4b457703d88b6180016c05b8ac04efbcdfb13232a963c83acc8badef2bf0b9f365007aa7e22437442af09de081f598069d93cbb58f7cc99b07823f6737ea8f41a270d6d9994450d612b21edf0f557bc2575c8ab7c377b1e03fdff21687ccef50b496214f90aaa60ef781ba43d8c6561a5d132bf9bad1a1c74d0a20aded68cb5a473aa805b8a36fbcd8aa951dbada03a073d0b1141a16b49d0af74abbfddbc9348d29aab0c37a6f97cc27933c1887c917121fe3901ad77f9ae2d50ceebca5dbb0098ef5eba5a310f1fa5ba3ec190d0e1c0bbf725a09c8c0e31c4a43d69b63aa6f277b08dad92fa345a95e6fd058eb4c6e31593da81026536c2144d3129fedb1233563b06497dc7b9250bb6c719a31375355e524579467da905fab01360b822952247a9c8efe83448773f98c19c37865cf982fb12191e661785ac1e2d6d2dd70828cf6b7b27cf10e948a0ad5126d043a66e5d262163c1d6d37d6e7bb8ac654624074b4de3adadc1c089641f95219e6cbb8e4867cd05f2ae4d7d8d71ba2a4ca4907157160e97bc2ce039ca82c3b2feabec4674429e76a5b47c72a3762e80770a83709257c503766890a8c977c84f189ff92932580438954709a3a26894d094ec4385a81d9b149d7bc98039688cbb4e4ebb9d3b9a77050f867230fcfc5d0043b725657e95e293a1b846bbd9eb9049cc666fe019e46c8ee8ef440c2b4f7cc09b424d47aea64a40297b4e12821b1c9743246129fe1d42c7a847bf09b31bf1b49272a375b67a42d1719b6a11366d2d6e9381fb0db69a7114f5032c6f82c0ba587d699e51e4fdd88c9a9c74b1cd06b6f8c6732e8a1270ab4d0473cabeb89f256e8e13386ac5cd53ba29e9e6fa4dc9f688eb51141f1a7e6879da217e89444302443d3da31b85f2d5ef4966f0ec875b79d973cd0e79ae027f066455ed686db106326be2c60343d1dc22bbb3159794816713d8333ff9494dd3fc7e847c8ea7fae0351e0dab329b47410ee2f63671bf56962146068214c857a9482eb9f0aa3234376347f3e33f47bbf6013c0b540cea5ed80ab07dce52609fe783feeb88f63085ab6e065fbf328ab4e0a425e26c16755f01054d3cb37f35d7a7e7b823296b635106d6f4fe250a095cd7ad08b75754c3f1ed928584436f7cdc2adf5d7fcd2eb573c6e3a93a7462ce4448140f396dc2467fc6390d445ca3f5cf8edae1d15e98fefe20b5d3d8b684c528ba1904bd98c6758fa8d882035886bd1b46aa27c2ffd1aa512abebb80835bc8e35e50be22a8ae2205df49da8a273606a80bf45550ec9cfab4b897a08bf5cdd5292a4e275dae8e05bee7e686025113297545ae099f2084135d3dcc6a0c3a7b372ceb81ce3f1dd0ae3d2c7ea1d99bf3aa584d33bd2073b3e37980d2c5d677e93ad6ff65751ee3cb3cf5f7261f244a5771d6229bb5b87df77308df4f1543ee60ba35936dec9f94426df8c4b40dff88e18a9efd85fb2f861e7f1a3f95e180b26b8cc0ec456371b362d3f01c5515a09b50a48061e7338ae8545111022159bae9b2056f7fdc87a42ba71a45cd835a092a8e472ac320f353359901c340618b4a8bfb4a300fb8563fe3e0b40b9563da44f2a49217e06260c3c75be267444b4b35890f010fecb84581e4363ed7cfce30a68e39f649f85363da822b6edc6e5cb368ec1c33df34a690da12b9a3b1ad7f1adf06083e70763eb1e20c571d3b2d65f9be7d16e08d2f6f97e0897e4e19e6192d7e2b54e9af96c5b33cc86213a07159bc54e511f6804786aabe1cfb1f6d42f4afc44025fbb9ed53bb5287517c33385318d5379e295e08ee4edb501288ea1cb772453d27be9e2201f2591e3c4d5e3dd2c1b9321428db9dd08c21a14575153b759c73a58ab336091aff542be5a70b535458f8dfd31c9a819de29787c2b3291bc29f181d4a41ece37eb8009a6c2cb5b3c3e3093bb54337dee9036f79baf812c89d9e3eb9b1d2f227c7db8fab5741bae28a620f4f0bf179b4e919b8188b5dc009d9cf9e9505eb2bef4a3812a099ba05bb6908b5095c7e3e5e078cd1acd8ab35156b91001cd1dbb2ba2677ef6301b7d4678157c153db20f8997aec4ab871e6c603af7942353a322737472297c223cf68c891a9a0d9f43847f054e85beaea77f2ea4be3e38aebca02849ce7975b17afd804f3709592255f25f804a159d08d105419be6569e861037f0c027d7f5f737fb6a686b3bcc07454aa1ff0410039bc6969ccefbc5dacec7c761f5b00ffe584bef5e7f15c146cd051a29b7e39e31f58dbae316288935051b94f264756609efacb927821068d88d77fe54ad00e4c530864e169b1b36beab64440cdca18998de8c527a8ba1e509a4672cf478b498ef27f475e00083afd5ff39c5350f873f21c79ac5ff15394a9409a655af866ee63b9caef7799056223435077416f516ab26aae9bfb9690b61d0b5711eb6b10566bd0171d4d4841d65a65f5e3115afa4eb396aae92b015ee4f241363a2eef7cc906ce010b8f27093827ead04e309b643f7a8749c6d64fadb4dfffcecafea91566fa40fec95d471fc286add0a5c554a9e6bdb0fdb83dca137ce280c8ee22de93f306ed9d8d55dfd3f4ef01ba13eb6fc33d09725d6ceac38944917f936cb3fcba192dfaf4e1f1ea87c5ac4a589a3f0646d0b1449b8c14014a37b02179bfb23d7512b68317d4e849ea7643b53765a1e73d391c88a056a2c42b7af5801381e22149ebb9def30df0ad452dc3db5d7c8bea46ef6564998aaab269011ad07c8e2df1338ffbc4cf92b822807ba1f3928748c9b07788cfd670a33b8c0e9de88688563a62c0e46d52b1649934df7fcede5939a346aff1c311c20fc7aa412556576f980a74b2573ee47ae304d0ed89f82c621979178f79a08816b6f82fce3184690eac481835dc43327eec31e0adc1a1cb7185152104d9fbf8c330eeaee11651dec93f4040e4af3f97c3cbed4355b21cb2f0156a013bc53abcf655f77974ded349f20440582f17f3ea405736a76cdf8d3995f150d45164459acce6e56b2d57c1998e8233a7a0b14e54ffa5d276a4201124e8bbb4aae4622a02de8b6f0da746b809d17592384d62d8e21a2382707917d1fc89914d2249c14e8de8e5f209698aa43d00080a143a0ebe4037bc0d3afc516c89bbb46547a41ef690520ae9391df4797377d228c80cda8124c7da64fef7f9443cd75610530c4ecd328a6a1ea79579b6419da0b4ecd592711a6fd20802a7a118e2bab0907e76ced0db446c46997a2e145d776a80577b39349fffbfcc5a530181fbaa6dfdb2daa07aef3e157ce7fdb928c3a6ec956b8cd4e119360b72b4f9471c34e024398ef48b4a28c2c51ac235a6f856d1df923317f9c6364c2d5f2fa15faf117a9d687fc2b651bab09ff4eb776c9e48284f06b7ce92631ef81406b7e1cb28675ee32c2a5551af0682c9b94f5924e90f57c75fb7b1d1ffa768ae5f63eca8f0cbf54148df31cfb035ccddacd711f8bb4ea0865b565034c6208fc37db7a5b3e33e6c065eead57eaa4a5448f644eb2ddb1c4be929880e2736db78abf56f7cc33bef156f1f51e4858ad7c79c05dff4781cd62ef89ffc0cdb31cb2337bf4c6b70d722dd87e7a4423a3bfbb5123b191d881d9710abf4106a3b9e639366fcb23b7dc0aba6411b07d04b1fb5333b3bdae84b981a41d4d0ce9748033c53c75a5c67cc9781fd5a33356d4fe6b3290db5c3da5fae7bdceaa8ebe6337fb50bd795f84c3dc35a704af711bcb881ecfd345d1d6125b8bdbdc2a5ae4c15f8d0a6f270a2ad29380fdd3d600b91ca9b364fd6b2e7de4399f1a6af2410d994f962c2700d1ef175e7d924c1c88b7cec8ef60d5027d432bff2f2d0359967e725aa009cf38519a69f22513ff16aacca95df8317752e9b1f774d61b0afbe0f9c13c399e036bfaa650c42b3d800941dea382a0566e7a99ca624dd1d64b7975cb4bd7794fb5a1c8ef7d67496776c2ad9cd4b691ab1253118c71fadd73ae79c21a3008a63a7c24d376a7a11d94b75f3982f60cbf07e8ca00ab6b4e1387dcf1927e2617fe78fa83a23d43c786f606227dd0d647a8d96727eefd61e0e3522b23708d7de6a469521106d64e332693c6d691fbab71ec42152611026609b4ab500a2725af158719cb98eb02ef321632bbb75804eb70526e623ea7e5bd5ecdefc72a8ece072e3d141c28bbc3eea888a25e02e28ac13bdcc37dd4242b5f9ccb9a8b6f4d0853312db235c7fc923e1c17d8048a56c1e48e06a9081ef0c7634e75a9046b9294f3da4c7a71e2d106637eeac44dcda03613b1a5663a97608cf5e0baa8b27b855ffe9ef82a3b65b8645a6f0c26ead86c92c74f33462a8212e77a315251cc2c27b1e937be8ee3edcd6ccba4e19ed99c271904d4aeebcae17385535965dc274fdf1bf563c449c63ec1cddf2a3f6978d10fdad6d39377395782eabe112a758006e34b84f3fadc545beea50ad40ebbd1a56894303da1f58d03a2de5728a5305308dd34b491aa23b1e04ac8de71c318bd00882bd6aa69bacc88476fbb70d73380c7a0cc841e358fe3070423af357ea392fb8163cc7360cdef786660bed666574cedc045c1bd8c993ddd58e7089444d049fc8b1990710100f7079d0feec9f8f3035e6e1720719876d11349c25ae34b497f0425af3da63e4ae6a05fb63f039854b78fdb3a85aadecd660c8778ea727206c43a325327eefecd2cb9a9e463899c0f7f8057dfed6758037e7b1c7cda"}) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0x80000000, 0x3, 0xb8b}]}, 0x10) 00:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf0]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1429.291365][T28695] FS-Cache: Duplicate cookie detected [ 1429.296876][T28695] FS-Cache: O-cookie c=0000000071817128 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1429.305823][T28695] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000433a5f41 [ 1429.313008][T28695] FS-Cache: O-key=[10] '0200020000807f000008' [ 1429.319141][T28695] FS-Cache: N-cookie c=00000000c99c3592 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1429.327856][T28695] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000ff848786 [ 1429.335093][T28695] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x104]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1429.397623][T28760] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:50 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:51 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000011000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x1f4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:51 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x40000000000001b9, &(0x7f0000000800)=[0xee00, r2]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1429.788913][T28777] FS-Cache: Duplicate cookie detected [ 1429.794549][T28777] FS-Cache: O-cookie c=0000000071817128 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1429.803403][T28777] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000433a5f41 [ 1429.810677][T28777] FS-Cache: O-key=[10] '0200020000807f000008' [ 1429.816834][T28777] FS-Cache: N-cookie c=00000000eda7c50c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1429.826022][T28777] FS-Cache: N-cookie d=00000000c744bfc3 n=000000001b5e6714 [ 1429.833213][T28777] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000000180), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:51 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000088000000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:51 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x300, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:51 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x8) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000002c0)={0xc, "4fb494e4692c2ddde86cb6adffa1c04fe0bff0bc4094db70223a2f188bcc99e20a8c4204fbb3aa5b635a8873dffab579f9062128d312740ed32cde7aba5b73a1634d5fc8a5f7579a199d75626e5ca18a37e715b60dfe761243868555a03495294ce7017a62a19ad6423b6df41161216e427fca4f4948befa0becaa5b5cda18b3"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3e8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000110000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1430.347287][T28856] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 [ 1430.428904][T28844] FS-Cache: Duplicate cookie detected [ 1430.434505][T28844] FS-Cache: O-cookie c=00000000b9de34a2 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1430.443379][T28844] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000f9bc5b2c [ 1430.450662][T28844] FS-Cache: O-key=[10] '0200020000807f000008' [ 1430.457086][T28844] FS-Cache: N-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1430.465989][T28844] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a39b4669 00:36:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1430.473525][T28844] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:51 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfeb, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x20f8, 0x5, 0x4, 0x3, 0x5, 0x400}) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000880000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:52 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) dup3(r0, r0, 0x80000) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x59, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x500]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1430.543112][T28880] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x314, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x543]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1430.750034][T28904] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:52 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0xffffffff00000001, {0x2, 0x3ec, 0x1, 0x5, 0x3, 0x5}, 0xb91}, 0xe) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000100)=0x100000000) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:52 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000001000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x600]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1430.987768][T28931] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:52 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) r2 = accept4(r0, &(0x7f0000000180)=@un=@abs, &(0x7f0000000040)=0x80, 0x80000) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000000c0)=0x80, 0x2) 00:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:52 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00', 0x3}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x3ec, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1431.291383][T28954] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1431.571868][T28980] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1431.777029][T28972] FS-Cache: Duplicate cookie detected [ 1431.782609][T28972] FS-Cache: O-cookie c=0000000064340d19 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1431.791882][T28972] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000bf6eb762 [ 1431.799339][T28972] FS-Cache: O-key=[10] '0200020000807f000008' [ 1431.805983][T28972] FS-Cache: N-cookie c=000000001690efde [p=00000000a8002570 fl=2 nc=0 na=1] [ 1431.814864][T28972] FS-Cache: N-cookie d=00000000c744bfc3 n=000000009b4690bc 00:36:53 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0086"]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={r6, 0xffffffffffffff16}, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) r7 = fcntl$dupfd(r3, 0x0, r2) bind$nfc_llcp(r7, &(0x7f0000000600)={0x27, 0x0, 0x2, 0x0, 0x0, 0x5, "18f682ce82eb10c83390b40981c931cb541c9996a54ac0de531197f4bd630ec12fb12955df4d1412decd09fc11c71b6d8a0765f78f7913c23c15725ab99507", 0x1c}, 0x60) mount$9p_unix(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x2908000, &(0x7f0000000440)={'trans=unix,', {[{@cache_none='cache=none'}], [{@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@fowner_gt={'fowner>', r5}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@permit_directio='permit_directio'}]}}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1431.822418][T28972] FS-Cache: N-key=[10] '0200020000807f000008' [ 1431.823225][T29001] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:53 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000002000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x700]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:53 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x500, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:53 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) write$P9_RSTATFS(r0, &(0x7f0000000180)={0x43, 0x9, 0x1, {0x8, 0xff, 0x0, 0x1000, 0x1, 0x3, 0x2, 0x2, 0x7}}, 0x43) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x806]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1432.173247][T29027] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:53 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f0000000180)="75573ff5f13accae58780ec7ee392f1f070d950a364d1f31125efc5c271221dd2f981863aba1c835713b1243b32e1a8d8383e4377546d697af0be62dcc44f8a647528b20b8", 0x45) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x900]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1432.353224][T29040] IPVS: ftp: loaded support on port[0] = 21 00:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1432.402337][T29048] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 [ 1432.435529][ T21] device bridge_slave_1 left promiscuous mode [ 1432.455646][T29038] FS-Cache: Duplicate cookie detected [ 1432.461352][T29038] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1432.470318][T29038] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000020a79b2d [ 1432.477904][T29038] FS-Cache: O-key=[10] '0200020000807f000008' [ 1432.484404][T29038] FS-Cache: N-cookie c=000000001611478e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1432.493058][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1432.493176][T29038] FS-Cache: N-cookie d=00000000c744bfc3 n=000000000c5fb2ab [ 1432.508284][T29038] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:54 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd116, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000580)=[{&(0x7f0000000840)="5cf702fefbd5b4a22d0bbefabb6679720d65eb128d37352884a3aedf1b2cc402f34a2d95cc1c4344e11f36c370d7d0beaa56b9f94eead63d439431ee3965d7d489d04c2f02cb7f256c4c75d7c3aee62ebd0610406f5dd22a85018cdb68881eabc889730de3d86611f54cb394b1956aa23689d12f40bdd1e3ee52d2736171a22da3d5e0", 0x83}, {&(0x7f0000000480)="56b0853f9f06caf7dbf0447c0e211cf91deba2155ba5be1f591be7c1537364b52797cd7e", 0x24}, {&(0x7f0000000540)="17bba02df6ed6d71a201a797", 0xc}, {&(0x7f0000000900)="ac5cee8b1459159c3eec4066eea72b66c40c887e1a742f826dc8782b2e4ede67d875409e004c3ddd8f99e39c0a6b52c4247ffb8909fef0d8ba8e696bad1fc4273a435960b4850d36746ae7553d5299452b27c8fe1b972f06c2b6abf59e588ebfc6520f4a06dbef3c211d40f99c8cbe2b375289f82a7e4824a9be9e3e0182e13d79490e1b92e0fa9d7f68f919a585f0fb76d9", 0x92}], 0x4, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000740)='/dev/vbi#\x00', 0x3, 0x2) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2a, 'pids'}, {0x2f, 'io'}, {0x2f, 'pids'}, {0x2f, 'io'}, {0x2b, 'rdma'}]}, 0x1a) add_key$keyring(&(0x7f0000000ac0)='keyring\x00', 0x0, 0x0, 0x0, r2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x13f) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r4, 0x40}, &(0x7f0000000300)=0xc) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000340)) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x6) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000040)='fuse\x00') r5 = shmget$private(0x0, 0x3000, 0x408, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r5, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000780)='pids') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) setxattr$security_evm(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="030108000000050c00c7f4704493ce16d2dcc3d6b807b34825e20c26a53968846a9b7f85709b5029afcab69c3324d53dd4dfbedce85255d35f66ef820cb7d2c22a5e2f99cf7857557ca000d8260b7010d371858f4fbcf99edeb0f27a72c6463b9e3546c0b8c11cc0a7eafb2a6e6f16301cf1e9249dabe0cd47c3b0c336cd75ecb71238bbf35059d77e8038b6f6c18c31bb330b25a5f031471ad0706b5f2f571582b183ee52a4654494d7f6298f69c3e26d6226bb1494c5461aa62d44b30aabf3d29d0047de60eb4a679195572472869b03"], 0xd1, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000d80)=[r6, r6, r6, r6, r6, r6, r6, r7, r6]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000b00)=ANY=[@ANYBLOB="77a7b03651600a8b2892f771c90000000000002a2475a0527c1fc0390ea4895aeb48b0e224106b9993a84cc3a63c6f25aa6a53076a9aaad9a7317f775ca3551d4e6660943d888709a8a5801bc81ad37d8e111499f15c4439fdc4c946f9f71b512948414dc3ca155aca672452f86dcd50e1b304d2dc1563c07edd2ecf27cd668d4dcddea52d8d84a8d430a3c003ee238fd124eea3a7f1c9a386b0460d8f47d97dbb0a9e4178d6eea86a49aaaf87b73d582caf155d439a4e9d916f5df60000000000000000000000"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x9, 0x1, 0xfffffffffffffffd, 0xc000000000000002, 0x8, 0xf73acf, 0xfffffffffffffffd, 0x7fe, 0x7fffffff, 0xdf}) [ 1432.563949][ T21] device bridge_slave_0 left promiscuous mode [ 1432.575460][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1432.623163][T29064] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:54 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f00000000c0)={0x0, 0x72da}) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1432.830902][ T21] device hsr_slave_1 left promiscuous mode [ 1432.890199][ T21] device hsr_slave_0 left promiscuous mode [ 1432.941284][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1432.958930][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1433.012723][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1433.069372][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1433.141879][ T21] bond0 (unregistering): Released all slaves [ 1433.358875][T29040] chnl_net:caif_netlink_parms(): no params data found [ 1433.398669][T29040] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.405850][T29040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.413459][T29040] device bridge_slave_0 entered promiscuous mode [ 1433.421554][T29040] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.428704][T29040] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.436740][T29040] device bridge_slave_1 entered promiscuous mode [ 1433.453293][T29040] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1433.462947][T29040] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1433.482228][T29040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1433.490366][T29040] team0: Port device team_slave_0 added [ 1433.496539][T29040] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1433.504461][T29040] team0: Port device team_slave_1 added [ 1433.565244][T29040] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1433.573190][T29040] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1433.657237][T29040] device hsr_slave_0 entered promiscuous mode [ 1433.704668][T29040] device hsr_slave_1 entered promiscuous mode [ 1433.754911][T29040] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1433.762755][T29040] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1433.790817][T29040] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.798003][T29040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1433.805381][T29040] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.812423][T29040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1433.880704][T29040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1433.894076][T29040] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1433.912245][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1433.922457][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.938221][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.956510][T29040] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1433.963362][T29040] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.981626][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1433.993695][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.000806][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1434.031561][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1434.042308][ T7721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.049416][ T7721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.078034][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1434.087060][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1434.096423][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1434.105511][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1434.123993][T29040] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1434.131150][T29040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1434.139317][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1434.153260][T29040] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1434.167373][T29040] 8021q: adding VLAN 0 to HW filter on device batadv0 00:36:55 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000011000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:55 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x600, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:55 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xa00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1434.345235][T29112] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xc00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000088000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:56 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80ffff, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) mkdir(&(0x7f0000000040)='./file0\x00', 0x34) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1434.667140][T29146] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 [ 1434.732144][T29135] FS-Cache: Duplicate cookie detected [ 1434.738062][T29135] FS-Cache: O-cookie c=00000000bacd447e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1434.747069][T29135] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000046dcbe50 [ 1434.754416][T29135] FS-Cache: O-key=[10] '0200020000807f000008' [ 1434.760813][T29135] FS-Cache: N-cookie c=0000000095be6eba [p=00000000a8002570 fl=2 nc=0 na=1] [ 1434.769646][T29135] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000df93e4d9 00:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c12") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000010000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1434.776955][T29135] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xd00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1434.889519][T29170] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x700, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000020000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="e5c7007d95c75c85a40668c7293bf435ee38f77631aea55a1c969bb3e8097f601dd15ac78b652be38a66537617b85d520e96a9452d6ff72e841bc804b0c193fd338fe46cdf27d0de6eaf1f2432"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c12") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:56 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfd, 0x4220}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000110000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1435.381445][T29222] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe80]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xa00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000800000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c12") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:57 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200, 0x0) r3 = gettid() ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @multicast1}, &(0x7f00000000c0)=0xc) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) syz_extract_tcp_res(&(0x7f00000001c0), 0x0, 0x9) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) recvfrom$llc(r2, &(0x7f00000002c0)=""/108, 0x6c, 0x2020, &(0x7f0000000340)={0x1a, 0x33a, 0xef, 0x6, 0x1000, 0x8, @random="881b98c2fe4f"}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1435.623444][T29248] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x1100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1435.947337][T29277] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:57 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000180)=0xffffffffffffff85) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="42a1b8f19f8bbf539d81271ab5e9cd720cae41f23309ad14c52bcad7c6c3e5d8c67896a212bea1674b8c3660e03e7f8fa4dc610ce8c97e7dacc670ab5e0ef000f5ec7943d7030fe7ac56d9ea9f4a91ca9672ee1d3bb6ebbadaed1bc03888f2607efa0dc04c3f0753ca19907aa89464324e0212e36ff0558835b97e7bfc53e2d2d6ed9dac58c924629d141aa32ead7859b302bff85738c0c91a0000000000"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:57 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000880000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:57 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x1020, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:57 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000ffffffff0000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:57 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getattr(r2, &(0x7f00000000c0), 0x30, 0x0) 00:36:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2800]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1436.215166][T29305] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1436.385131][T29323] FS-Cache: Duplicate cookie detected [ 1436.390751][T29323] FS-Cache: O-cookie c=00000000e8d0bee5 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1436.399773][T29323] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000f88fefaf [ 1436.407201][T29323] FS-Cache: O-key=[10] '0200020000807f000008' [ 1436.413779][T29323] FS-Cache: N-cookie c=0000000057df7a0a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1436.424905][T29323] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002eb70794 00:36:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1436.432378][T29323] FS-Cache: N-key=[10] '0200020000807f000008' [ 1436.443850][T29333] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2900]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:57 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000020000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1436.585106][T29343] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x4f85, 0x5}, @window={0x3, 0xffffffffffff0001, 0x80000001}], 0x2) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0xfffffffffffffe23) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) getsockopt$inet6_dccp_buf(r0, 0x21, 0x100000000bd, &(0x7f0000004000)=""/4096, &(0x7f00000002c0)=0xfffffffffffffe02) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:58 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x40, 0x8000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000380)=r3) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='\\g\x00', 0x0, 0x0) accept4$vsock_stream(r4, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x800) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(r4, 0x5501) 00:36:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000110000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1437.072719][T29366] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:58 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x1100, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2b00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000880000000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a0") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000001100000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:58 executing program 4: socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f0000000100)=@md0='/dev/md0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='logfs\x00', 0x81000, &(0x7f00000002c0)='\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1437.297315][T29398] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:36:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1437.450328][T29406] FS-Cache: Duplicate cookie detected [ 1437.455932][T29406] FS-Cache: O-cookie c=00000000e3f51381 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1437.464833][T29406] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d88803fb [ 1437.472025][T29406] FS-Cache: O-key=[10] '0200020000807f000008' [ 1437.478172][T29406] FS-Cache: N-cookie c=00000000db499809 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1437.486868][T29406] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d051bfeb [ 1437.494062][T29406] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:59 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) r1 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)="eca99ba310", 0x5, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getgroups(0x400000000000017a, &(0x7f00000003c0)=[r2, r2, r2, r2, r2, r2, r2, r2, r2]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:59 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000008800000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:59 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7ff, 0x80000) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f00000000c0)=0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:36:59 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x1403, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:36:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:36:59 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000010000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:36:59 executing program 4: socket$inet6(0xa, 0xa, 0xddd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2, @broadcast, 0x0}, &(0x7f0000000300)=0xc) bind$bt_hci(r1, &(0x7f0000000340)={0x1f, r2, 0x2}, 0xc) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x200100) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000100), 0x4) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) mq_timedsend(r3, &(0x7f0000000840)="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", 0xd86, 0x4, &(0x7f00000000c0)={r4, r5+30000000}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1438.185646][T29411] FS-Cache: Duplicate cookie detected [ 1438.191088][T29411] FS-Cache: O-cookie c=00000000d5cd310e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1438.200181][T29411] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ff28b0b6 [ 1438.207403][T29411] FS-Cache: O-key=[10] '0200020000807f000008' [ 1438.213496][T29411] FS-Cache: N-cookie c=000000006d146943 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1438.222205][T29411] FS-Cache: N-cookie d=00000000c744bfc3 n=000000001c203431 [ 1438.229405][T29411] FS-Cache: N-key=[10] '0200020000807f000008' 00:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 00:36:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:36:59 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000020000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1438.382337][T29484] FS-Cache: Duplicate cookie detected [ 1438.388022][T29484] FS-Cache: O-cookie c=00000000d5cd310e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1438.396900][T29484] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ff28b0b6 [ 1438.404081][T29484] FS-Cache: O-key=[10] '0200020000807f000008' [ 1438.410212][T29484] FS-Cache: N-cookie c=000000004ea1ab4f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1438.418928][T29484] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000727404a1 [ 1438.426175][T29484] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xfffffffffffffee1, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f00000000c0)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000300)={0x0, 0x4, 0x2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x80, 0x22200) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="a6be8ce852dc01736d18c4f6b22de52aa279ca3b0c113055d646817df98e35a5bb592c8c864be600d69379a2cb0545e7d9005dd460b088dd435c94dc66"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) syz_mount_image$f2fs(&(0x7f0000000340)='f2fs\x00', &(0x7f0000000380)='./file0\x00', 0x1000, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000ac0)="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", 0x1000, 0x5}], 0x102100a, &(0x7f0000000840)=ANY=[@ANYBLOB="686561702c696e6c696e0500646174612c70726a6a71756f74613d2f6465762f766964656f30002c757365725f78617474722c6e6f7265636f766572792c6261636b67726f756e645f67633d6f6e2c616c6c6f635f6d6f64653d72657573652c646f6e745f61707072616973652c657569643e", @ANYRESDEC=r3, @ANYBLOB=',appraise_type=imasig,defcontext=root,uid=', @ANYRESDEC=r3, @ANYBLOB=',subj_user=keyring\x00,dont_hash,appraise_type=imasig,smackfsroot=nfs\x00,\x00']) keyctl$get_persistent(0x16, r3, r1) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000480)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000500)={r5}) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 00:37:00 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) modify_ldt$read_default(0x2, &(0x7f0000000840)=""/4096, 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xd, 0x100) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4000) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000000100)=0x18a) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000300)=r5) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000001c0)={r4, 0x1, 0x6, @local}, 0x10) 00:37:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3580]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:00 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:00 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000110000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3a00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 00:37:00 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000005200000229bd7000fbdbdf250208000d000700000000000089d346d5222a9799eec31bf90400000024063e9640285753a5c54389073a28137426b27c14eb0cfeaa9841ba1c9caa78aab945ea5b1388c676c973b9198b3bdb0aca2cb84d3660bd72158ed7d8c4b04b05c89d5da700c21e2d0673c092e56f9738a605a9e02bb1290562aa0020ee3da1b05be30a25be8f55f017c8aa2104aa89e9d9b627d7ec472710a16865df710ae2a8beb43f792ae1c1726bb3d1"], 0x1c}}, 0x40) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001b80)=0x327) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f0000001c00)='./file0\x00', 0x0, 0x80fffe, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/241, 0xf1}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f0000001840)=""/186, 0xba}, {&(0x7f0000001900)=""/174, 0xae}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/166, 0xa6}], 0x8, &(0x7f0000001a80)=""/231, 0xe7}, 0x40000001) [ 1439.156281][T29540] FS-Cache: Duplicate cookie detected [ 1439.161816][T29540] FS-Cache: O-cookie c=00000000b66ef44d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1439.170744][T29540] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000097419071 [ 1439.177970][T29540] FS-Cache: O-key=[10] '0200020000807f000008' [ 1439.184064][T29540] FS-Cache: N-cookie c=00000000706ac522 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1439.192791][T29540] FS-Cache: N-cookie d=00000000c744bfc3 n=000000005d24e981 [ 1439.199992][T29540] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3b00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:37:00 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000880000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1439.388914][T29571] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:21 [ 1439.528830][T29566] FS-Cache: Duplicate cookie detected [ 1439.534236][T29566] FS-Cache: O-cookie c=00000000b66ef44d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1439.543665][T29566] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000097419071 [ 1439.550915][T29566] FS-Cache: O-key=[10] '0200020000807f000008' [ 1439.557064][T29566] FS-Cache: N-cookie c=0000000060e403b7 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1439.565786][T29566] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a5289221 [ 1439.572967][T29566] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="62860b89fb6484d47d4acaf90fd17e46fcdce4fd728074160c5c54e9f53887ebf9f4381e8d94c5fbeb873406463437e87265fedd2263b842d365ed347fc4fc243f2fa133f6557afe5b4249a017008e82887440a2e6545840a9276728e7526593"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0xfffffffffffffd8d) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) r3 = gettid() ptrace$setregs(0xf, r3, 0xfffffffffffffffb, &(0x7f0000000500)="c8506bae7ee4c156034edfd0dde88b8d8ba280d4bec22a4d00fe13cf6ff0f496c94207e233bacc1ba352f1eb85c56dca7a86ba14bf4eef8594787b3a95a635db8042a6a5f978f9f8e1fb0dc2c98af1291c92eb7ada24dbbc65dc14a41d8e583a029ef10a95295b5343378211b7140a090f80f399cc1e9aae5dc3") ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:37:01 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000180)={{0x1e, 0x6, 0xde, 0x20000000, 0x8, 0x1}, 0x7}) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x103000, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[0x2, 0x100, 0x9]}) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:37:01 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:01 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2010, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1439.898252][T29614] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:21 00:37:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:01 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000200000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1440.089124][T29630] FS-Cache: Duplicate cookie detected [ 1440.094848][T29630] FS-Cache: O-cookie c=0000000025d962b1 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1440.103839][T29630] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000099bb2631 [ 1440.111257][T29630] FS-Cache: O-key=[10] '0200020000807f000008' [ 1440.117795][T29630] FS-Cache: N-cookie c=00000000cfc9d188 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1440.126752][T29630] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008bd431f4 00:37:01 executing program 4: socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4200, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/93, 0x5d) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:37:01 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x3602, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1440.133997][T29630] FS-Cache: N-key=[10] '0200020000807f000008' [ 1440.158955][T29647] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:21 [ 1440.824924][T29625] FS-Cache: Duplicate cookie detected [ 1440.830376][T29625] FS-Cache: O-cookie c=0000000058123d82 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1440.839425][T29625] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005b95da40 [ 1440.846728][T29625] FS-Cache: O-key=[10] '0200020000807f000008' [ 1440.852809][T29625] FS-Cache: N-cookie c=000000001d36bf50 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1440.861534][T29625] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d9eb0f3c [ 1440.869108][T29625] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:02 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) getgid() request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:37:02 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x101000, 0x102) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000600)={0x6, 0x118, 0xfa00, {{0x40, 0x1, "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", 0x4c, 0x93, 0xc, 0x800, 0x3, 0x63, 0x3, 0x1}, r2}}, 0x120) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0xffd3, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f00000001c0)={0x3, r3}) socketpair(0x9, 0x80000, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0xffffffff, &(0x7f0000000100)=0x1) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) connect$unix(r5, &(0x7f0000000840)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f00000019c0)='/dev/media#\x00', 0x1f, 0x240800) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/btrfs-control\x00', 0x420900, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0x0, &(0x7f0000001a00)) r7 = getuid() fstat(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='overlay\x00', 0x804008, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d6a746163000000000000000600000000000000000000000000000000000000", @ANYRESDEC=r7, @ANYBLOB="2c6d6561737572652c736d61636b6673666c6f6f723d002c61756469747be71158643e", @ANYRESDEC=r8, @ANYBLOB="ff07000000000000"]) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:37:02 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000001100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4305]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:02 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000008000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1440.932330][T29686] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:37:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4400]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1441.039177][T29683] overlayfs: unrecognized mount option "mjtac" or missing value 00:37:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) [ 1441.153329][T29715] overlayfs: unrecognized mount option "mjtac" or missing value 00:37:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4788]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:02 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000008800000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x3f00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1441.233065][T29728] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:37:02 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x7704, 0x4) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='cramfs\x00', 0x4, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:37:02 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getpeername$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10) recvfrom$x25(r0, &(0x7f00000002c0)=""/212, 0xd4, 0x12102, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) write$P9_RMKDIR(r2, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x2, 0x3, 0x4}}, 0x14) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0xffffffffffffffff}, 0x2c) 00:37:02 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000ffffffff00000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1441.476955][T29749] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0x1b5d/0x1da0 00:37:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) 00:37:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6488]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r2) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x8010, r1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2, 0x54c4, 0x1, 0x0, 0xef}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2000000, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:37:03 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000200000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) 00:37:03 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:03 executing program 0: socket$inet6(0xa, 0x3, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000040)=0x78) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r2 = msgget$private(0x0, 0x102) msgrcv(r2, &(0x7f00000002c0)={0x0, ""/45}, 0x35, 0x1, 0x800) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x15, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) 00:37:03 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000001100000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20008004, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000280)="dc", 0x1, 0x4005, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000000)="700e", 0x2, 0x0, 0x0, 0x0) 00:37:03 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000008800000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:03 executing program 4: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000380)='asymmetr)c\x00', &(0x7f0000000180)={'\x00', 0x0}, &(0x7f0000000500)='R\trist\xe3c\asgrVid:De', r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x40000000000000) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x810000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1f, 0x2000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f00000002c0)="ab63473de72c59e2b9b3cf2c0221ff78e6b0541f4d4107185ef4f555896195b942863729a1b0fbf5a13490ee6a1b6f81636c91acd3571348e90cbfcccc39f9c3bc3cd1b75d1ab3e166360c52f628b4232ce24b1148febf4b92fa969a2c01a7f1b6fbca7726c8b0b6633371bad98b3f6b54b75959eb906af6d1cde4c10c3790cd8861a1", &(0x7f0000000440)=""/129}, 0x18) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x11) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 1442.143760][T29820] FS-Cache: Duplicate cookie detected [ 1442.150500][T29820] FS-Cache: O-cookie c=000000006f9e9933 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1442.159492][T29820] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000fcea831e [ 1442.167020][T29820] FS-Cache: O-key=[10] '0200020000807f000008' [ 1442.173467][T29820] FS-Cache: N-cookie c=0000000054691959 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1442.182252][T29820] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000018e98a0c 00:37:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x800e]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1442.189697][T29820] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:03 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4800, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:03 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000011000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8035]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:03 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000088000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1442.579177][T29867] FS-Cache: Duplicate cookie detected [ 1442.584908][T29867] FS-Cache: O-cookie c=000000006f9e9933 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1442.593760][T29867] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000fcea831e [ 1442.601021][T29867] FS-Cache: O-key=[10] '0200020000807f000008' [ 1442.607165][T29867] FS-Cache: N-cookie c=000000008bdaec72 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1442.615879][T29867] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000732fc501 [ 1442.623065][ T3865] FS-Cache: N-key=[10] '0200020000807f00 [ 1442.623095][T29867] 0008' 00:37:04 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='\x04symtric\x00', &(0x7f0000001ffb)={'\x00', 0x1}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:04 executing program 4: socket$netlink(0x10, 0x3, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:37:04 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000080)={@remote, 0x0, r3}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000280)={@rand_addr="341cd9f9fc2c1ab203644389392a1cdc"}, 0x14) 00:37:04 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4c00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'teql0\x00', 0x400}) 00:37:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8847]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:04 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000200000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:04 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 00:37:04 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000001100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8848]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1443.073529][T29938] FS-Cache: Duplicate cookie detected [ 1443.079878][T29938] FS-Cache: O-cookie c=00000000514d9f66 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1443.088904][T29938] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000012c49ff2 [ 1443.098290][T29938] FS-Cache: O-key=[10] '0200020000807f000008' [ 1443.104998][T29938] FS-Cache: N-cookie c=000000005321e56d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1443.113811][T29938] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000009193e64 [ 1443.121148][T29938] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:05 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="13f6cde66be9bd350df27ec7b613cee7d32d54c96588473a7856a209b64996e249644f212e955c7243bb09"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:05 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000008800000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x54) 00:37:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8864]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) [ 1443.806497][T29975] IPVS: ftp: loaded support on port[0] = 21 [ 1443.909666][T29986] FS-Cache: Duplicate cookie detected [ 1443.915307][T29986] FS-Cache: O-cookie c=000000002a97d416 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1443.924167][T29986] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a8697662 [ 1443.931395][T29986] FS-Cache: O-key=[10] '0200020000807f000008' [ 1443.937521][T29986] FS-Cache: N-cookie c=00000000fbd87867 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1443.937531][T29986] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000cc5d05bb [ 1443.937538][T29986] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:05 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6800, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f00000001c0), 0x0}, 0x18) 00:37:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8906]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:05 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000001000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f00000001c0), 0x0}, 0x18) [ 1444.361915][T30002] FS-Cache: Duplicate cookie detected [ 1444.367445][T30002] FS-Cache: O-cookie c=000000002a97d416 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1444.376552][T30002] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a8697662 [ 1444.383752][T30002] FS-Cache: O-key=[10] '0200020000807f000008' [ 1444.389871][T30002] FS-Cache: N-cookie c=00000000a1902e7f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1444.398573][T30002] FS-Cache: N-cookie d=00000000c744bfc3 n=000000001f4138a0 [ 1444.405818][T30002] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe803]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:05 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000002000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1444.422515][T29980] IPVS: ftp: loaded support on port[0] = 21 00:37:06 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000180)={0xdc, 0x0}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000001c0)={0x229, r3}) setsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000040)=0x4, 0x4) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) get_thread_area(&(0x7f00000002c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x522000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0xdd) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0xf2}, 0x0) 00:37:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00\x00\x00@\x00'}, &(0x7f0000000080)=0x54) 00:37:06 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000011000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1445.055048][T30048] IPVS: ftp: loaded support on port[0] = 21 [ 1445.189083][T30056] FS-Cache: Duplicate cookie detected [ 1445.194595][T30056] FS-Cache: O-cookie c=00000000cd17ebf4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1445.203435][T30056] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000059916c4a [ 1445.203443][T30056] FS-Cache: O-key=[10] '0200020000807f000008' [ 1445.203488][T30056] FS-Cache: N-cookie c=00000000a73fa96e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1445.203497][T30056] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004dc7351c [ 1445.203502][T30056] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:06 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6c00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:06 executing program 3: openat$null(0xffffffffffffff9c, 0x0, 0x381000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086610, 0x400006) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x530) 00:37:06 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000080000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf401]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x20480]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:07 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000088000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1445.630128][T30083] FS-Cache: Duplicate cookie detected [ 1445.635939][T30083] FS-Cache: O-cookie c=00000000cd17ebf4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1445.645704][T30083] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000059916c4a [ 1445.653231][T30083] FS-Cache: O-key=[10] '0200020000807f000008' [ 1445.659630][T30083] FS-Cache: N-cookie c=00000000629ed071 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1445.668537][T30083] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b621eef6 00:37:07 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000ffffffff000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1445.675897][T30083] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:07 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x7, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000ac0)=""/4096) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) fallocate(r0, 0x16, 0x5d, 0x200) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1ff, 0x10000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x1b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x401}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000002c0)={r3, 0xdc, "b3f49138b0ec251625ef0a499a288d3e6e517ed3fc1605bb6476c37a77085b40977d8cb39212052ae84afb782b3ffc5da135e39c5b3a9d502056a05524afdc591a12851552bec26603f7d9b022d208bd110cbf33574f4fef6f50f14f964c44146811d1c7e6f4357d97dba5c86e515822c398e2e6ed61704fc43459f39f033ed8278c8adcdc0e7b18b62e6d3ba20674aa3546b914d2ec0046ba50ed4778df902282440361dd6403f0f0b8793e3c46d4551e28965d0bc71a92767917e7db1135371a6ee85ea03b526c3d15b3cbccd662cae4e030211e569fb1de00c7db"}, &(0x7f00000003c0)=0xe4) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf0ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:07 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000002000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1446.132420][T30135] FS-Cache: Duplicate cookie detected [ 1446.138034][T30135] FS-Cache: O-cookie c=000000005564c488 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1446.146947][T30135] FS-Cache: O-cookie d=00000000c744bfc3 n=000000003338f740 [ 1446.154132][T30135] FS-Cache: O-key=[10] '0200020000807f000008' [ 1446.160276][T30135] FS-Cache: N-cookie c=00000000aa34433d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1446.168966][T30135] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002529f63c [ 1446.176208][T30135] FS-Cache: N-key=[10] '0200020000807f000008' [ 1446.204998][T30129] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1446.397857][T30075] FS-Cache: Duplicate cookie detected [ 1446.403319][T30075] FS-Cache: O-cookie c=000000005564c488 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1446.412238][T30075] FS-Cache: O-cookie d=00000000c744bfc3 n=000000003338f740 [ 1446.419787][T30075] FS-Cache: O-key=[10] '0200020000807f000008' [ 1446.425928][T30075] FS-Cache: N-cookie c=0000000011e04737 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1446.434635][T30075] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000232ec233 [ 1446.441819][T30075] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:07 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7400, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x1000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:07 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000011000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x20402102001fde, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x484, &(0x7f0000000180)=""/122, &(0x7f0000000040)=0x7a) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000300)=0xc) 00:37:07 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000088000000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1446.535778][T30146] IPVS: length: 122 != 24 [ 1446.546337][T30152] IPVS: length: 122 != 24 00:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:08 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 1446.699932][T30173] device lo entered promiscuous mode [ 1446.732443][T30173] Y­4`Ò˜: renamed from lo [ 1446.792706][ T26] audit: type=1804 audit(1547858228.210:229): pid=30178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=1 00:37:08 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1446.910855][ T26] audit: type=1800 audit(1547858228.240:230): pid=30178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=0 00:37:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:08 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000110000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:08 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7802, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1447.021478][ T26] audit: type=1804 audit(1547858228.370:231): pid=30173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=1 00:37:08 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000880000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1447.151152][ T26] audit: type=1804 audit(1547858228.490:232): pid=30205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=1 [ 1447.187510][T30223] FS-Cache: Duplicate cookie detected [ 1447.192936][T30223] FS-Cache: O-cookie c=000000007062f379 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1447.201912][T30223] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000b46fb6b5 [ 1447.209144][T30223] FS-Cache: O-key=[10] '0200020000807f000008' [ 1447.215299][T30223] FS-Cache: N-cookie c=0000000093f092b9 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1447.223989][T30223] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003c5fa670 [ 1447.231247][T30223] FS-Cache: N-key=[10] '0200020000807f000008' [ 1447.237625][T30224] FS-Cache: Duplicate cookie detected 00:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4010000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1447.243085][T30224] FS-Cache: O-cookie c=000000007062f379 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1447.251997][T30224] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000b46fb6b5 [ 1447.259325][T30224] FS-Cache: O-key=[10] '0200020000807f000008' [ 1447.265451][T30224] FS-Cache: N-cookie c=0000000025f1bc81 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1447.274110][T30224] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000030232e11 [ 1447.281335][T30224] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x5000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1447.439357][ T26] audit: type=1804 audit(1547858228.860:233): pid=30173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=1 [ 1447.551563][ T26] audit: type=1800 audit(1547858228.860:234): pid=30173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=0 00:37:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1447.623076][ T26] audit: type=1804 audit(1547858228.980:235): pid=30189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=16558 res=1 00:37:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x7000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:09 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 1447.870047][ T26] audit: type=1804 audit(1547858229.290:236): pid=30244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=16529 res=1 00:37:09 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) r1 = dup(r0) write$P9_RWSTAT(r1, &(0x7f0000000180)={0x7, 0x7f, 0x1}, 0x7) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1447.984402][ T26] audit: type=1800 audit(1547858229.320:237): pid=30244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16529 res=0 00:37:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:09 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7a00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1448.197933][T30265] FS-Cache: Duplicate cookie detected [ 1448.203355][T30265] FS-Cache: O-cookie c=0000000060bc446e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1448.212407][T30265] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000486d2c14 [ 1448.219653][T30265] FS-Cache: O-key=[10] '0200020000807f000008' [ 1448.225789][T30265] FS-Cache: N-cookie c=000000001f9059bc [p=00000000a8002570 fl=2 nc=0 na=1] [ 1448.234506][T30265] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006ebfd6b3 [ 1448.241693][T30265] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:09 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000001000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x9000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1448.350191][T30275] FS-Cache: Duplicate cookie detected [ 1448.355670][T30275] FS-Cache: O-cookie c=0000000060bc446e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1448.364558][T30275] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000486d2c14 [ 1448.371771][T30275] FS-Cache: O-key=[10] '0200020000807f000008' [ 1448.377897][T30275] FS-Cache: N-cookie c=000000004754e3e6 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1448.377908][T30275] FS-Cache: N-cookie d=00000000c744bfc3 n=000000000aecc469 [ 1448.377916][T30275] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xa000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xc000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1448.750704][T30294] IPVS: ftp: loaded support on port[0] = 21 00:37:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xd000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1448.990884][ T26] audit: type=1804 audit(1547858230.410:238): pid=30249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=16529 res=1 00:37:10 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 00:37:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x101040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x54, r2, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xc9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x810) 00:37:10 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x8400, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x11000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1449.300582][T30294] chnl_net:caif_netlink_parms(): no params data found [ 1449.339171][T30326] FS-Cache: Duplicate cookie detected [ 1449.344661][T30326] FS-Cache: O-cookie c=00000000d852cd8c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1449.353577][T30326] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000019b3dfed [ 1449.353585][T30326] FS-Cache: O-key=[10] '0200020000807f000008' [ 1449.366943][T30326] FS-Cache: N-cookie c=000000004fe3b99c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1449.375684][T30326] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b94604cc [ 1449.382867][T30326] FS-Cache: N-key=[10] '0200020000807f000008' [ 1449.407718][T30336] FS-Cache: Duplicate cookie detected [ 1449.413258][T30336] FS-Cache: O-cookie c=00000000d852cd8c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1449.422403][T30336] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000019b3dfed [ 1449.429940][T30336] FS-Cache: O-key=[10] '0200020000807f000008' [ 1449.436476][T30336] FS-Cache: N-cookie c=00000000be2961ad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1449.445434][T30336] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000dadff581 [ 1449.452710][T30336] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x21000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1449.551949][T30294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1449.571096][T30294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1449.591459][T30294] device bridge_slave_0 entered promiscuous mode [ 1449.620538][T30294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1449.633323][T30294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.652847][T30294] device bridge_slave_1 entered promiscuous mode [ 1449.703900][T30294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1449.740559][T30294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1449.818909][T30294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1449.843092][T30294] team0: Port device team_slave_0 added [ 1449.867340][T30294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1449.884883][T30294] team0: Port device team_slave_1 added [ 1449.893023][T30294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1449.909727][T30294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1449.967423][T30294] device hsr_slave_0 entered promiscuous mode [ 1450.024665][T30294] device hsr_slave_1 entered promiscuous mode [ 1450.074967][T30294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1450.088778][T30294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1450.164818][T30294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1450.171915][T30294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1450.179287][T30294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1450.186376][T30294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1450.230078][T30294] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1450.237646][T30294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1450.248544][T30294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1450.256454][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1450.264008][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1450.272767][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1450.285329][T30294] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1450.292197][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1450.299967][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1450.309641][T30294] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1450.316965][T30294] 8021q: adding VLAN 0 to HW filter on device team0 [ 1450.325928][T30294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1450.333645][T24730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1450.342474][T24730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1450.350840][T24730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1450.357909][T24730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1450.367604][T30294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1450.375763][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1450.384188][ T7721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1450.392625][ T7721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1450.399668][ T7721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1450.410552][T30294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1450.418267][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1450.429378][T30294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1450.437995][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1450.461011][T30294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1450.468829][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1450.477669][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1450.491372][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1450.505683][T30294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1450.513425][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1450.522242][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1450.532671][T30294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1450.540888][T24730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1450.549175][T24730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1450.567782][T30294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1450.577890][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1450.586541][T16598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1450.604734][T30294] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1450.611472][T30294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1450.626527][T30294] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1450.642372][T30294] 8021q: adding VLAN 0 to HW filter on device batadv0 00:37:12 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000002000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x28000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:12 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 00:37:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="d571a0b70d04301825872b384c301efb5bc2c22a15dc0e"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:12 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x8402, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x29000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:12 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000011000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2b000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1451.045724][T32191] device bridge_slave_1 left promiscuous mode [ 1451.051946][T32191] bridge0: port 2(bridge_slave_1) entered disabled state 00:37:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1451.131758][T30407] FS-Cache: Duplicate cookie detected [ 1451.141677][T30407] FS-Cache: O-cookie c=00000000ec50dfef [p=00000000a8002570 fl=212 nc=0 na=0] [ 1451.150668][T30407] FS-Cache: O-cookie d= (null) n= (null) [ 1451.158168][T30407] FS-Cache: O-key=[10] '0200020000807f000008' [ 1451.164860][T30407] FS-Cache: N-cookie c=000000004c8bfdcc [p=00000000a8002570 fl=2 nc=0 na=1] [ 1451.173694][T30407] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000fb5feced [ 1451.181005][T30407] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) syz_mount_image$minix(&(0x7f0000000380)='minix\x00', &(0x7f00000003c0)='./file0\x00', 0x548b, 0x4, &(0x7f0000000540)=[{&(0x7f0000000440)="e55d41d8443a4d177e212bf8a25f1efdf4756365199a335ae8b01981e39daa925d84a0d93da1502278fccc43b680af642c9b25225245f65ddbea3d41d170eb593c7c858ef7eab5c62bfb847763f4b0c3eb8370847c3ba981a618975b2a5978d4e10d1feca5496701e167472d93", 0x6d, 0x8}, {&(0x7f0000000500)="92f58a8a1b2905", 0x7, 0x4}, {&(0x7f0000000ac0)="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", 0x1000, 0x6}, {&(0x7f0000000640)="5f94bba193329350db1803b823100d66a1d676992a3df4eefa631c9fefd10bfebe6881c1a0ab0e7a37fb99c609b40da29de60292f4e3bd402b9370b9f764559064f46505a23ba7162fe3f851d08df77a6df90771842ad9253b3c9303e804ae374fbbe912b8dd4397eb170e4c53ea0536344990d4bf3f370e843b735e6a306c68462c86e21502edeb052891eac2f5fdbe1b9b5c662987b5a2d5", 0x99, 0x40}], 0x84002, 0x0) request_key(&(0x7f0000001cc0)='i`_v\x85\x00\x00\x00\x00\x01\x00\x01\xf4\xb2jz\x05\xce\xa4\x8cw\xee\xad\xcf\x82\xe0j\xa9\xabp\xb4@\xf8(\x8bq\xabcC\xe0\xf9/MV\xcc\x17\xe9\x14\ta\xb6\\P\xdb\x01\xb0(\xc2.\x94;J\xbc\x88\'\xa3\xa6\xb6wAQ\x9b\x1b\x85\xb0:\x8c\xe3\x8b\xbb\xca\xc9\xdb\x94}B\xaeR\xc0\x05\a\t\x83U\xe8R\x0fw\xae+\xba6\xf9\xca\x8e\xba\xd95i\xe8\xa6\x82\xe1\xfcF\xcf\xf9W~83\xfa\x90\vT\x1e\x02\x8c\x83E&\xe1\x01\xc5', &(0x7f0000001c80)={'\x00', 0x3}, &(0x7f0000001c40)='nodevsecurity[\x00', r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000001c0)=0xfffffffffffffed2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000000c0)=0x6) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) accept$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @default, @bcast, @bcast, @default, @remote, @default, @netrom]}, &(0x7f0000000340)=0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r4 = getpgid(0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r4) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000008c0)=ANY=[@ANYBLOB="460e31f9ea07df3cee5994b370ddb5527b251253a837cab04e947de172c064591467223f3748f12d4615af8a56b48d6b333de3051073863436682f0000000000000000000000"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1451.312139][T32191] device bridge_slave_0 left promiscuous mode [ 1451.331885][T32191] bridge0: port 1(bridge_slave_0) entered disabled state 00:37:12 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000088000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:12 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xe002, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1451.647959][T32191] device hsr_slave_1 left promiscuous mode [ 1451.691937][T32191] device hsr_slave_0 left promiscuous mode 00:37:13 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 00:37:13 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000010000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1451.786792][T32191] team0 (unregistering): Port device team_slave_1 removed 00:37:13 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="c972751f031d61f7fed5532ed1eb9b355afa051521a68db67699882511992756420b98db9088fbb58dffba71e27bb1764f365283d57bb62299994e529e1dc494b1126fbbde793da407a18b3a5ff75d54a4c3cd2faaa38cb5e30dd74a6022193e91088fa07f330100b6d6996132f76b1ff971192d4c312e904aa1fcd9efc3e2e7792d215258d9a4237519bcfb561b6f08d70ee5f682dfeafb7fcde3a16ce50f083689f446ce3c52ff613001dff945e45ca6082dc6276aea8df98f30c380ebf5fa26e24401a31991e31aa1b674b150432ef64aa53fc3fa32514af047a07664af87d9a61b45bd7e99c9918e0b0ae270bf5205"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:13 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000020000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:13 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xec03, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1451.844015][T32191] team0 (unregistering): Port device team_slave_0 removed [ 1451.873591][T32191] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1451.948656][T32191] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1452.003464][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 1452.003477][ T26] audit: type=1804 audit(1547858233.420:245): pid=30486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=17773 res=1 00:37:13 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000110000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1452.092499][ T26] audit: type=1800 audit(1547858233.450:246): pid=30486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=17773 res=0 00:37:13 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000800000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1452.188035][ T26] audit: type=1804 audit(1547858233.550:247): pid=30501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=17773 res=1 [ 1452.300626][T32191] bond0 (unregistering): Released all slaves 00:37:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:13 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) clone(0x100000, &(0x7f00000002c0)="56276b8eccc66b223c0ee7e6a9f1aa354811e45f77dd6bdc80edca9d09c55803c557361437ea87cc8dc1a274b45a16b9c92c63bf87cae9263c0b76bea334720f16886b8c708431d369bdde9fe18b45a68bcd5da848afec086acad9fbc3e8ddec7f59c5bfe3814cb8fc18c90e534612df97588e9ed49e851353c288f822685db7ae", &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000640)="ef4a6b92092f92f180b64fad4846501aa45a68f5cb319ba9526861f57b2766404b728b51dadcc81c8a3882dc1ef33d14f544100027e43a41bded4af08f54d93e9e958f330b8eea3edb1dbea21d0ed13772d3b1cfd96d6468ebfbf1864b8e5a94d6cea0527b45d3f0fd36e879894c4047f768edf296df031bb8a3b0e649356e39194b070157df2bf81e9c388e08660af3ddc3e0603260b01b66c93d6672dc5d4d4d9aae6c88fff703ca6e256be5ec8bd073addd26e9f8a1bff2f2495228184d87845b08b7bcec0ed9") get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:13 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xedc0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:13 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000880000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:13 executing program 3: write$smack_current(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00\x00\x00\x00\x01\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r0, 0x0) unshare(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20001, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r3, 0x2008200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 00:37:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1452.662885][T30537] FS-Cache: Duplicate cookie detected [ 1452.668357][T30537] FS-Cache: O-cookie c=00000000c99c3592 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1452.677341][T30537] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000049bdef79 [ 1452.684572][T30537] FS-Cache: O-key=[10] '0200020000807f000008' [ 1452.690804][T30537] FS-Cache: N-cookie c=00000000645133b5 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1452.699518][T30537] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000f7ada036 [ 1452.706780][T30537] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2f000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:14 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000ffffffff0000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1452.717102][ T26] audit: type=1804 audit(1547858234.140:248): pid=30562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=16587 res=1 00:37:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1452.815612][ T26] audit: type=1800 audit(1547858234.140:249): pid=30562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="bus" dev="sda1" ino=16587 res=0 00:37:14 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xd932}, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xee6e0000, 0x2a0]}, 0x5}, 0x80, 0x0, 0x0, &(0x7f0000000180)}, 0x0) 00:37:14 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000020000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x33000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1452.925312][ T26] audit: type=1804 audit(1547858234.190:250): pid=30539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="bus" dev="sda1" ino=16587 res=1 00:37:14 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000110000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xb2, 0x408000) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) sendmsg$key(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="31089f5bd6b25fcb318d54ab37e7464a2da8f293818b03dfc431f465c5c8392e75f0a8bf13d20e28516cbb6ad7a0b18465d309aa8f49ea40dfcd26c7704d"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) dup2(r0, r1) 00:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3a000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:15 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000880000000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:15 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x40000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:15 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000001100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1454.074884][T30636] FS-Cache: Duplicate cookie detected [ 1454.080622][T30636] FS-Cache: O-cookie c=0000000020a687da [p=00000000a8002570 fl=222 nc=0 na=1] [ 1454.090311][T30636] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000433a5f41 [ 1454.097672][T30636] FS-Cache: O-key=[10] '0200020000807f000008' [ 1454.104169][T30636] FS-Cache: N-cookie c=00000000aa34bf25 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1454.113135][T30636] FS-Cache: N-cookie d=00000000c744bfc3 n=000000009d8c6a5c 00:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3b000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:15 executing program 3: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/88, 0x58}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffef2, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0xfffffffffffffe95}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x16c, &(0x7f0000000100), 0x28a, &(0x7f0000000540), 0x5b}, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0xa, 0x4000000000080002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8941, &(0x7f0000000240)=0x1) [ 1454.120403][T30636] FS-Cache: N-key=[10] '0200020000807f000008' [ 1454.176786][T30628] FS-Cache: Duplicate cookie detected [ 1454.182312][T30628] FS-Cache: O-cookie c=0000000020a687da [p=00000000a8002570 fl=222 nc=0 na=1] [ 1454.191457][T30628] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000433a5f41 [ 1454.199013][T30628] FS-Cache: O-key=[10] '0200020000807f000008' [ 1454.205761][T30628] FS-Cache: N-cookie c=000000005c6c1649 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1454.214657][T30628] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d323a740 [ 1454.222010][T30628] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:15 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000008800000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:15 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000010000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0xfffffffffffffffd) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000000c0)=ANY=[@ANYBLOB="feaa46098037a3273489f53d0e0640af04e5150891eb1dde612401ee0d"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:16 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000020000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:16 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x1000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3f000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:16 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000110000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x40000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1455.039039][T30705] FS-Cache: Duplicate cookie detected [ 1455.044872][T30705] FS-Cache: O-cookie c=00000000d9cd5562 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1455.053806][T30705] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000042fb9472 [ 1455.062411][T30705] FS-Cache: O-key=[10] '0200020000807f000008' [ 1455.068811][T30705] FS-Cache: N-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1455.077646][T30705] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a39b4669 00:37:16 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000880000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1455.084949][T30705] FS-Cache: N-key=[10] '0200020000807f000008' [ 1455.146099][T30702] FS-Cache: Duplicate cookie detected [ 1455.151610][T30702] FS-Cache: O-cookie c=00000000d9cd5562 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1455.160725][T30702] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000042fb9472 [ 1455.169370][T30702] FS-Cache: O-key=[10] '0200020000807f000008' [ 1455.175909][T30702] FS-Cache: N-cookie c=00000000d9027094 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1455.184804][T30702] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a3dcda4c [ 1455.192139][T30702] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:16 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6008, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 00:37:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x43050000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:16 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:16 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x2000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1455.541338][T30755] FS-Cache: Duplicate cookie detected [ 1455.546834][T30755] FS-Cache: O-cookie c=00000000d9cd5562 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1455.555720][T30755] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000042fb9472 [ 1455.562905][T30755] FS-Cache: O-key=[10] '0200020000807f000008' [ 1455.569056][T30755] FS-Cache: N-cookie c=000000005597d0ad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1455.577811][T30755] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000024cf5093 [ 1455.585061][T30755] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:17 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:17 executing program 3: clone(0x20020102100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0xfffffeb5, 0x0, &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe}) 00:37:17 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000200000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x44000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:17 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000001100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:17 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000400)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x40002015}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x0) [ 1455.975020][T30787] FS-Cache: Duplicate cookie detected [ 1455.980778][T30787] FS-Cache: O-cookie c=0000000064340d19 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1455.989883][T30787] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000bf6eb762 [ 1455.997257][T30787] FS-Cache: O-key=[10] '0200020000807f000008' [ 1456.003835][T30787] FS-Cache: N-cookie c=0000000071817128 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1456.012753][T30787] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000053ad4c03 00:37:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x80040200]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1456.022969][T30787] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:17 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000008000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x800e0000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:17 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000008800000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1456.322831][T30818] FS-Cache: Duplicate cookie detected [ 1456.328303][T30818] FS-Cache: O-cookie c=0000000064340d19 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1456.337343][T30818] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000bf6eb762 [ 1456.344586][T30818] FS-Cache: O-key=[10] '0200020000807f000008' [ 1456.350688][T30818] FS-Cache: N-cookie c=00000000a2bb9cd7 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1456.359412][T30818] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006b073c49 [ 1456.366641][T30818] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:18 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000000040), &(0x7f0000000180)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:18 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x3000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x80350000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:18 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000ffffffff00000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x81000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:18 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000200000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x2, &(0x7f0000000140)=@raw=[@alu={0x4, 0x79d, 0xf, 0x0, 0x0, 0x0, 0x4}, @exit], &(0x7f0000000280)='syzkaller\x00', 0x8, 0x30, &(0x7f0000000300)=""/48, 0x41000, 0x1, [], 0x0, 0xd}, 0x48) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, &(0x7f0000000340)) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x37f) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) [ 1457.032984][T30872] FS-Cache: Duplicate cookie detected [ 1457.038939][T30872] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1457.048428][T30872] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006ecd9985 [ 1457.055997][T30872] FS-Cache: O-key=[10] '0200020000807f000008' [ 1457.062352][T30872] FS-Cache: N-cookie c=0000000027e30131 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1457.071177][T30872] FS-Cache: N-cookie d=00000000c744bfc3 n=000000005f11f0b3 00:37:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x84ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:18 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000001100000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1457.078655][T30872] FS-Cache: N-key=[10] '0200020000807f000008' [ 1457.141268][T30866] FS-Cache: Duplicate cookie detected [ 1457.147059][T30866] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1457.156141][T30866] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006ecd9985 [ 1457.163469][T30866] FS-Cache: O-key=[10] '0200020000807f000008' [ 1457.169928][T30866] FS-Cache: N-cookie c=000000003d90b4b9 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1457.178972][T30866] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000071fcfbdf [ 1457.186359][T30866] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x86ddffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:18 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:18 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x10001, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0xfffffffffffffef4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r2 = msgget$private(0x0, 0x28) msgsnd(r2, &(0x7f00000002c0)={0x3, "df1bc6bc1432fa32f2f98a7b64cd371d652abde559bb93e663b614a0dfc38ab8573ed174f2bc09d1dc65a297146f6c35b625382f8618cd577bed659fa06bd0991ca872416b8a7f28bce6960ea2afffc34e737f6c661c92ea054c4dbc0f8c491ba7064af6d8908a0d853c18d2979097cee9273e4ae7137016403e97d82ea5c8ec6a"}, 0x89, 0x800) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:18 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000008800000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x87ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:18 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000011000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88470000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:19 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x5000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xfffffffffffffffe}}, 0x6, 0x0, 0x40, 0x80000000, 0x20}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000240)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000ac0)={0x81, 0x2, 0x8001, 0x3f, r1}, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000480)=0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000a80)={0x53, 0xffffffffffffffff, 0x31, 0x72c, @scatter={0x6, 0x0, &(0x7f00000009c0)=[{&(0x7f00000056c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/67, 0x43}, {&(0x7f00000004c0)=""/10, 0xa}, {&(0x7f0000000840)=""/86, 0x56}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000066c0)=""/4096, 0x1000}]}, &(0x7f0000000a00)="ac26f85a249f9ae7a47893f68f2bd800aeecf3a3e2521362d690a9fcac705a8a4831f7991743f970db750d24cbd190cf49", 0x0, 0xffffffff, 0x10, 0x1, 0x0}) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f0000000100)={0x3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000ac0), 0x4, 0xf) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f00000002c0)=ANY=[@ANYRES16=r3]) uselib(&(0x7f0000000280)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000b00)=0x4) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x600}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) 00:37:19 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000088000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88480000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:19 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88640000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1458.031073][T30963] FS-Cache: Duplicate cookie detected [ 1458.037772][T30963] FS-Cache: O-cookie c=000000009c948bd4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1458.046956][T30963] FS-Cache: O-cookie d=00000000c744bfc3 n=000000007f987fa8 [ 1458.054371][T30963] FS-Cache: O-key=[10] '0200020000807f000008' [ 1458.060761][T30963] FS-Cache: N-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1458.069705][T30963] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000e6df555f 00:37:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xfffffffffffffffe}}, 0x6, 0x0, 0x40, 0x80000000, 0x20}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000240)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000ac0)={0x81, 0x2, 0x8001, 0x3f, r1}, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000480)=0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000a80)={0x53, 0xffffffffffffffff, 0x31, 0x72c, @scatter={0x6, 0x0, &(0x7f00000009c0)=[{&(0x7f00000056c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/67, 0x43}, {&(0x7f00000004c0)=""/10, 0xa}, {&(0x7f0000000840)=""/86, 0x56}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000066c0)=""/4096, 0x1000}]}, &(0x7f0000000a00)="ac26f85a249f9ae7a47893f68f2bd800aeecf3a3e2521362d690a9fcac705a8a4831f7991743f970db750d24cbd190cf49", 0x0, 0xffffffff, 0x10, 0x1, 0x0}) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f0000000100)={0x3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000ac0), 0x4, 0xf) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f00000002c0)=ANY=[@ANYRES16=r3]) uselib(&(0x7f0000000280)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000b00)=0x4) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x600}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) [ 1458.077202][T30963] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:19 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000200000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1458.159535][T30972] FS-Cache: Duplicate cookie detected [ 1458.165290][T30972] FS-Cache: O-cookie c=000000009c948bd4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1458.165335][T30972] FS-Cache: O-cookie d=00000000c744bfc3 n=000000007f987fa8 [ 1458.181435][T30972] FS-Cache: O-key=[10] '0200020000807f000008' [ 1458.187983][T30972] FS-Cache: N-cookie c=00000000d7e57c34 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1458.196805][T30972] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000cdba949d 00:37:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xfffffffffffffffe}}, 0x6, 0x0, 0x40, 0x80000000, 0x20}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000240)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000ac0)={0x81, 0x2, 0x8001, 0x3f, r1}, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000480)=0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000a80)={0x53, 0xffffffffffffffff, 0x31, 0x72c, @scatter={0x6, 0x0, &(0x7f00000009c0)=[{&(0x7f00000056c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/67, 0x43}, {&(0x7f00000004c0)=""/10, 0xa}, {&(0x7f0000000840)=""/86, 0x56}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000066c0)=""/4096, 0x1000}]}, &(0x7f0000000a00)="ac26f85a249f9ae7a47893f68f2bd800aeecf3a3e2521362d690a9fcac705a8a4831f7991743f970db750d24cbd190cf49", 0x0, 0xffffffff, 0x10, 0x1, 0x0}) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f0000000100)={0x3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000ac0), 0x4, 0xf) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f00000002c0)=ANY=[@ANYRES16=r3]) uselib(&(0x7f0000000280)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000b00)=0x4) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x600}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) [ 1458.204104][T30972] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:20 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f00000000c0)=0x1ff, 0x4) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="a312a24bbdeed4c3876b4365202e8639f299434b8d486c6a3027b66ff781bb93e3f93c79323ec4e40f4e66c08c71f05f7b59946c26b52afe31550d70c4ba1d47cac467a98445c3ce2db575289d32f135bd67afe649b9c2eed9d79b0c42b434a555a85ef207dcd83fdc99da2bafa818ab635b862953fc932a89a9aab6088a1e4b76eee9a5aa6d818358cf71f42d31882ba2b4a70a998b98243246dbffad88401a9ec7dfed914106387ca107c81cb25bc28b34aef078795d0319d5"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88a8ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:20 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:20 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000001100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:20 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @rand_addr=0xfffffffffffffffe}}, 0x6, 0x0, 0x40, 0x80000000, 0x20}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000240)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000ac0)={0x81, 0x2, 0x8001, 0x3f, r1}, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000480)=0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000a80)={0x53, 0xffffffffffffffff, 0x31, 0x72c, @scatter={0x6, 0x0, &(0x7f00000009c0)=[{&(0x7f00000056c0)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/67, 0x43}, {&(0x7f00000004c0)=""/10, 0xa}, {&(0x7f0000000840)=""/86, 0x56}, {&(0x7f00000008c0)=""/214, 0xd6}, {&(0x7f00000066c0)=""/4096, 0x1000}]}, &(0x7f0000000a00)="ac26f85a249f9ae7a47893f68f2bd800aeecf3a3e2521362d690a9fcac705a8a4831f7991743f970db750d24cbd190cf49", 0x0, 0xffffffff, 0x10, 0x1, 0x0}) ioctl$KVM_DIRTY_TLB(r0, 0x400caeaa, &(0x7f0000000100)={0x3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000ac0), 0x4, 0xf) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f00000002c0)=ANY=[@ANYRES16=r3]) uselib(&(0x7f0000000280)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000b00)=0x4) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4096, 0x600}], 0x1, &(0x7f0000003600)=[{&(0x7f0000003580)=""/121, 0x79}], 0x1, 0x0) 00:37:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88caffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x6, 0x8000031, r1, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000012c0)=""/4096, &(0x7f0000000000)=0x1000) 00:37:20 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000008800000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1458.725199][T31029] FS-Cache: Duplicate cookie detected [ 1458.730644][T31029] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1458.739574][T31029] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000081199214 [ 1458.746845][T31029] FS-Cache: O-key=[10] '0200020000807f000008' [ 1458.752950][T31029] FS-Cache: N-cookie c=000000000e70dead [p=00000000a8002570 fl=2 nc=0 na=1] [ 1458.761690][T31029] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000086a28eec [ 1458.769268][T31029] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:20 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000001000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x51, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x1e, 0x0, &(0x7f0000000080)="d9634c85d0e1accdee74fd1666c2b90f70bfb210444629a168c791961c9c", 0x0, 0x3f00}, 0x28) [ 1458.782974][T31027] FS-Cache: Duplicate cookie detected [ 1458.788582][T31027] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1458.797477][T31027] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000081199214 [ 1458.804712][T31027] FS-Cache: O-key=[10] '0200020000807f000008' [ 1458.810830][T31027] FS-Cache: N-cookie c=0000000095be6eba [p=00000000a8002570 fl=2 nc=0 na=1] [ 1458.819531][T31027] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000295caf38 [ 1458.826768][T31027] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:20 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002af, 0xf0ffffff7f0000) 00:37:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:21 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000002000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:21 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:21 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000120004d9078e29607149378d33ef7fac33b0448d368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed049515543fef136ed3989973f5549ac345725ac7f6aa0"], 0x0) 00:37:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x89060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x18, 0x0, 0x4, 0x0) [ 1459.715052][T32191] device bridge_slave_1 left promiscuous mode [ 1459.725259][T32191] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.771619][T31094] FS-Cache: Duplicate cookie detected [ 1459.777343][T31094] FS-Cache: O-cookie c=000000004256a80d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1459.787436][T31094] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ea82115a [ 1459.794760][T31094] FS-Cache: O-key=[10] '0200020000807f000008' [ 1459.801130][T31094] FS-Cache: N-cookie c=000000007e2fdea2 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1459.809896][T31094] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a8577553 00:37:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1459.817231][T31094] FS-Cache: N-key=[10] '0200020000807f000008' [ 1459.879193][T32191] device bridge_slave_0 left promiscuous mode [ 1459.886808][T32191] bridge0: port 1(bridge_slave_0) entered disabled state [ 1460.047800][T32191] device hsr_slave_1 left promiscuous mode [ 1460.090675][T32191] device hsr_slave_0 left promiscuous mode [ 1460.150358][T32191] team0 (unregistering): Port device team_slave_1 removed [ 1460.166549][T32191] team0 (unregistering): Port device team_slave_0 removed [ 1460.180399][T32191] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1460.221494][T32191] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1460.320982][T32191] bond0 (unregistering): Released all slaves 00:37:21 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) write(r2, &(0x7f00000002c0)="b9", 0x1) 00:37:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x89ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1460.429172][T31106] IPVS: ftp: loaded support on port[0] = 21 00:37:21 executing program 4: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1460.550643][T31101] FS-Cache: Duplicate cookie detected [ 1460.556243][T31101] FS-Cache: O-cookie c=000000004256a80d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1460.565138][T31101] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ea82115a [ 1460.572330][T31101] FS-Cache: O-key=[10] '0200020000807f000008' [ 1460.578499][T31101] FS-Cache: N-cookie c=00000000f07cbe3a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1460.587195][T31101] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006fb0a9e3 [ 1460.587203][T31101] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r1 = shmget(0x3, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="44c7283ac55fb23de2cce328ff6e7d01d686d74bc3062e96f0544bf54be151bd265c80ded0e83b3b62b30a3852bee656e829ddcd7135f78f36c723b4f66172405a5edbe52655915f50246b993b048f6cab126cf281b756383dc4b9e08a31e8926848b3d2db9e9b"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8dffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1460.887808][T31106] chnl_net:caif_netlink_parms(): no params data found [ 1460.940502][T31106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1460.948889][T31106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1460.957199][T31106] device bridge_slave_0 entered promiscuous mode [ 1460.965654][T31106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1460.972775][T31106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1460.983301][T31106] device bridge_slave_1 entered promiscuous mode [ 1461.010178][T31106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1461.022797][T31106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1461.047145][T31106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1461.055554][T31106] team0: Port device team_slave_0 added [ 1461.061857][T31106] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1461.070374][T31106] team0: Port device team_slave_1 added [ 1461.076770][T31106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1461.085383][T31106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1461.146176][T31106] device hsr_slave_0 entered promiscuous mode [ 1461.184597][T31106] device hsr_slave_1 entered promiscuous mode [ 1461.224921][T31106] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1461.232569][T31106] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1461.250702][T31106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.257793][T31106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.265181][T31106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.272238][T31106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.317044][T31106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1461.327208][T31106] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1461.338170][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1461.347237][T30434] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.366307][T30434] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.389204][T31106] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1461.396347][T31106] 8021q: adding VLAN 0 to HW filter on device team0 [ 1461.407164][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1461.416482][T20970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.423532][T20970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.445920][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1461.455434][T30434] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.462483][T30434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.471185][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1461.481482][T31106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1461.490133][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1461.498699][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1461.507635][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1461.519619][T31106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1461.529930][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1461.539210][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1461.556284][T31106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1461.564778][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1461.577721][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1461.593146][T31106] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1461.610925][T31106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1461.639316][T31106] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1461.678033][T31106] 8021q: adding VLAN 0 to HW filter on device batadv0 00:37:23 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000011000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:23 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xa000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) 00:37:23 executing program 4: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe8030000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) membarrier(0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:23 executing program 4: mkdir(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:23 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000080000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x65, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x6, 0x0, &(0x7f0000000100)) close(r2) close(r1) 00:37:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf4010000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1462.172940][T31179] FS-Cache: Duplicate cookie detected [ 1462.179963][T31179] FS-Cache: O-cookie c=0000000057df7a0a [p=00000000a8002570 fl=222 nc=0 na=1] [ 1462.188984][T31179] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000045850f17 [ 1462.196292][T31179] FS-Cache: O-key=[10] '0200020000807f000008' [ 1462.202809][T31179] FS-Cache: N-cookie c=0000000004838740 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1462.211642][T31179] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000020915500 00:37:23 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000088000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1462.218951][T31179] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:23 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x11000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1462.258724][T31205] FS-Cache: Duplicate cookie detected [ 1462.264150][T31205] FS-Cache: O-cookie c=0000000057df7a0a [p=00000000a8002570 fl=222 nc=0 na=1] [ 1462.273201][T31205] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000045850f17 [ 1462.280433][T31205] FS-Cache: O-key=[10] '0200020000807f000008' [ 1462.286593][T31205] FS-Cache: N-cookie c=00000000409c890c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1462.295308][T31205] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004085fd53 [ 1462.302514][T31205] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf5ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp6\x00') ppoll(&(0x7f0000000040)=[{r1, 0x80}, {r1}], 0x2, &(0x7f0000000080), &(0x7f00000000c0)={0x20}, 0x8) 00:37:23 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000ffffffff000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:23 executing program 3: [ 1462.654109][T31220] FS-Cache: Duplicate cookie detected [ 1462.660560][T31220] FS-Cache: O-cookie c=0000000057df7a0a [p=00000000a8002570 fl=222 nc=0 na=1] [ 1462.669623][T31220] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000045850f17 [ 1462.677010][T31220] FS-Cache: O-key=[10] '0200020000807f000008' [ 1462.683478][T31220] FS-Cache: N-cookie c=00000000c6715c96 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1462.692284][T31220] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000069231773 [ 1462.699660][T31220] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000180)={0x400, "10b3953ecf4910d1343faf9ed86fb20256cdc5b577e54618e89df08a17035849", 0x1, 0x9f13, 0x2, 0x8, 0x2000000, 0x2}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:24 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000002000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfeffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:24 executing program 3: 00:37:24 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x14030000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:24 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000011000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:24 executing program 3: 00:37:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffa888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1463.173797][T31267] FS-Cache: Duplicate cookie detected [ 1463.179488][T31267] FS-Cache: O-cookie c=000000006d146943 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1463.188871][T31267] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005074dcdb [ 1463.196276][T31267] FS-Cache: O-key=[10] '0200020000807f000008' [ 1463.202936][T31267] FS-Cache: N-cookie c=00000000e3f51381 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1463.211819][T31267] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000005419016 00:37:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffca88]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:24 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000088000000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:24 executing program 3: [ 1463.219347][T31267] FS-Cache: N-key=[10] '0200020000807f000008' [ 1463.260986][T31285] FS-Cache: Duplicate cookie detected [ 1463.266553][T31285] FS-Cache: O-cookie c=000000006d146943 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1463.275493][T31285] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005074dcdb [ 1463.282683][T31285] FS-Cache: O-key=[10] '0200020000807f000008' [ 1463.288838][T31285] FS-Cache: N-cookie c=000000001b044f0e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1463.297607][T31285] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b175df0b [ 1463.304849][T31285] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)={0xa6, 0x29, 0x2, {0x2, [{{}, 0x8, 0x9, 0x7, './file0'}, {{0xb0, 0x0, 0x3}, 0x3, 0x9, 0x7, './file0'}, {{0x8, 0x3, 0x5}, 0x1537, 0x0, 0x7, './file0'}, {{0x2, 0x1, 0x7}, 0x401, 0x9, 0x7, './file0'}, {{0x2, 0x2, 0x8}, 0x6a92, 0x2, 0x7, './file0'}]}}, 0xa6) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0xe9b3180363c7cce8, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:24 executing program 3: 00:37:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffdd86]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:24 executing program 3: [ 1463.626408][T31310] FS-Cache: Duplicate cookie detected [ 1463.632009][T31310] FS-Cache: O-cookie c=000000006d146943 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1463.644533][T31310] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005074dcdb [ 1463.652287][T31310] FS-Cache: O-key=[10] '0200020000807f000008' [ 1463.658897][T31310] FS-Cache: N-cookie c=00000000d5cd310e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1463.667720][T31310] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000070834700 [ 1463.675026][T31310] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:25 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x20000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:25 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000110000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:25 executing program 3: 00:37:25 executing program 3: 00:37:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffff84]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:25 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000880000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1464.118630][T31332] FS-Cache: Duplicate cookie detected [ 1464.124073][T31332] FS-Cache: O-cookie c=00000000e9ba9a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1464.132989][T31332] FS-Cache: O-cookie d=00000000c744bfc3 n=000000003500e667 [ 1464.140417][T31332] FS-Cache: O-key=[10] '0200020000807f000008' [ 1464.146577][T31332] FS-Cache: N-cookie c=00000000706ac522 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1464.155276][T31332] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000096cac2d8 [ 1464.162468][T31332] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:25 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000180), &(0x7f00000000c0)=0x60, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="ee413d3d02bc6a52537f7a4b8eeef2f8fc53e5f4a129b78e51f7f0e98ba118bd6b81983940f47af7af3ebc57a445d3c6ed96e60fa5ad4cc0dc495d5fe9dd52c491c8f2692c694122362d198f2d7c71eb5943a0819924ed5dd9cfc869508c180f1337a1dcba45c62b6d03568fa1cf7d9bc2659c951bb8b30a7f74e7e61c6698d5f75189053922b689c573f49cff6c08f42cff41734934bdbfbe9beb2b95fbb75fe8117dcdb553c1d056d1a1bd22f3ee53247ff49d7b81867b5a73c2adbaf1ede9a04f60dc3aacc9b0bd924eb8d9de3345d862a2e7cd3077734814a38639"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:25 executing program 3: 00:37:25 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000001000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffff87]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1464.349466][T31305] FS-Cache: Duplicate cookie detected [ 1464.354968][T31305] FS-Cache: O-cookie c=00000000e9ba9a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1464.363803][T31305] FS-Cache: O-cookie d=00000000c744bfc3 n=000000003500e667 [ 1464.371187][T31305] FS-Cache: O-key=[10] '0200020000807f000008' [ 1464.377303][T31305] FS-Cache: N-cookie c=000000004ea1ab4f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1464.386007][T31305] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003fd9f2a5 [ 1464.393194][T31305] FS-Cache: N-key=[10] '0200020000807f000008' [ 1464.523354][T31363] FS-Cache: Duplicate cookie detected [ 1464.529033][T31363] FS-Cache: O-cookie c=00000000e9ba9a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1464.537937][T31363] FS-Cache: O-cookie d=00000000c744bfc3 n=000000003500e667 [ 1464.545174][T31363] FS-Cache: O-key=[10] '0200020000807f000008' [ 1464.551262][T31363] FS-Cache: N-cookie c=00000000b66ef44d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1464.559952][T31363] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000003e2d24d [ 1464.567198][T31363] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:26 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x20100000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:26 executing program 3: 00:37:26 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000002000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffff88]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:26 executing program 3: 00:37:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffff89]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1464.961388][T31389] FS-Cache: Duplicate cookie detected [ 1464.966982][T31389] FS-Cache: O-cookie c=0000000060e403b7 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1464.976066][T31389] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008fcd95b1 [ 1464.983270][T31389] FS-Cache: O-key=[10] '0200020000807f000008' [ 1464.989404][T31389] FS-Cache: N-cookie c=00000000ee97c51d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1464.998126][T31389] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000709a3a3f [ 1465.005384][T31389] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:26 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000011000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="93481e7407e3975a1ba099295a1c5261ab327801df223687aaa2d87baf8cda86e0fe0cf7a61a5b6b72fc72af64ab12e65de4d6f48609a580273a327ebb1ae9"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:26 executing program 3: 00:37:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffff8d]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:26 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000088000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1465.351473][T31413] FS-Cache: Duplicate cookie detected [ 1465.357005][T31413] FS-Cache: O-cookie c=0000000060e403b7 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1465.365903][T31413] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008fcd95b1 [ 1465.373097][T31413] FS-Cache: O-key=[10] '0200020000807f000008' [ 1465.379267][T31413] FS-Cache: N-cookie c=00000000db499809 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1465.387966][T31413] FS-Cache: N-cookie d=00000000c744bfc3 n=000000000db42c29 [ 1465.395209][T31413] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:27 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x36020000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1465.670804][T31442] FS-Cache: Duplicate cookie detected [ 1465.676408][T31442] FS-Cache: O-cookie c=00000000e8d0bee5 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1465.685950][T31442] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000054c3513d [ 1465.693188][T31442] FS-Cache: O-key=[10] '0200020000807f000008' [ 1465.702776][T31442] FS-Cache: N-cookie c=0000000025d962b1 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1465.711649][T31442] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000307c5c2f [ 1465.719067][T31442] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:27 executing program 3: 00:37:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfffffff5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:27 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000010e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:27 executing program 3: 00:37:27 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000020e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfffffffe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1465.859152][T31457] FS-Cache: Duplicate cookie detected [ 1465.864733][T31457] FS-Cache: O-cookie c=00000000e8d0bee5 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1465.873577][T31457] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000054c3513d [ 1465.880880][T31457] FS-Cache: O-key=[10] '0200020000807f000008' [ 1465.887055][T31457] FS-Cache: N-cookie c=0000000065590054 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1465.895786][T31457] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000816fe0ec [ 1465.903011][T31457] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x35, 0x0, 0x0, 0xff000000}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8c2, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000180)=0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:27 executing program 3: 00:37:27 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000110e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x10000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:28 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x3f000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:28 executing program 3: 00:37:28 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000800e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1466.683119][T31503] FS-Cache: Duplicate cookie detected [ 1466.688988][T31503] FS-Cache: O-cookie c=000000006d1cb97e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1466.698015][T31503] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006e0ef515 [ 1466.705362][T31503] FS-Cache: O-key=[10] '0200020000807f000008' [ 1466.711810][T31503] FS-Cache: N-cookie c=000000001d36bf50 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1466.720643][T31503] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004c4fb542 00:37:28 executing program 3: 00:37:28 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000880e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1466.727931][T31503] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:28 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7043, 0x5ad0}) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:28 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000ffffffff0e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:28 executing program 3: 00:37:28 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x40000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x200000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:28 executing program 3: 00:37:28 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000020000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1467.466486][T31530] FS-Cache: Duplicate cookie detected [ 1467.471946][T31530] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1467.481041][T31530] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ee45002f [ 1467.488287][T31530] FS-Cache: O-key=[10] '0200020000807f000008' [ 1467.494424][T31530] FS-Cache: N-cookie c=000000006b28f54b [p=00000000a8002570 fl=2 nc=0 na=1] [ 1467.503081][T31530] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004a53a011 [ 1467.510325][T31530] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:29 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000110000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:29 executing program 3: 00:37:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x300000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1467.712812][T31576] FS-Cache: Duplicate cookie detected [ 1467.719135][T31576] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1467.728178][T31576] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ee45002f [ 1467.735524][T31576] FS-Cache: O-key=[10] '0200020000807f000008' [ 1467.741954][T31576] FS-Cache: N-cookie c=000000000168bf51 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1467.750748][T31576] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008f3f63c1 [ 1467.758134][T31576] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:29 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f0000000040)=0x1, 0x4) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x400000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:29 executing program 3: 00:37:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x401000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:29 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000880000000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:29 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x48000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:29 executing program 3: [ 1468.456063][T31573] FS-Cache: Duplicate cookie detected [ 1468.461478][T31573] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1468.470364][T31573] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000007574311 [ 1468.477612][T31573] FS-Cache: O-key=[10] '0200020000807f000008' [ 1468.483681][T31573] FS-Cache: N-cookie c=00000000b68040ad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1468.492373][T31573] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006e3a35c1 [ 1468.499800][T31573] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:30 executing program 3: 00:37:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x500000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1468.679279][T31632] FS-Cache: Duplicate cookie detected [ 1468.685897][T31632] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1468.694901][T31632] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000007574311 [ 1468.702237][T31632] FS-Cache: O-key=[10] '0200020000807f000008' [ 1468.708696][T31632] FS-Cache: N-cookie c=00000000742e77a2 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1468.717623][T31632] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003f4db1f7 [ 1468.724998][T31632] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="5ec9602d3afca8dd7aeaa54d1255f70334b006"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:30 executing program 3: 00:37:30 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000001100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x600000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:30 executing program 3: 00:37:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x700000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:30 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4c000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:30 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000008800000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:30 executing program 3: 00:37:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x800000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1469.426124][T31673] FS-Cache: Duplicate cookie detected [ 1469.431575][T31673] FS-Cache: O-cookie c=000000001903a8d9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1469.440480][T31673] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ebb13e77 [ 1469.447773][T31673] FS-Cache: O-key=[10] '0200020000807f000008' [ 1469.453857][T31673] FS-Cache: N-cookie c=000000008bdaec72 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1469.462893][T31673] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000004d23406 [ 1469.470122][T31673] FS-Cache: N-key=[10] '0200020000807f000008' [ 1469.628822][T31693] FS-Cache: Duplicate cookie detected [ 1469.634793][T31693] FS-Cache: O-cookie c=000000001903a8d9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1469.643749][T31693] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ebb13e77 [ 1469.651445][T31693] FS-Cache: O-key=[10] '0200020000807f000008' [ 1469.658152][T31693] FS-Cache: N-cookie c=0000000084618602 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1469.668103][T31693] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006c2f6045 [ 1469.675504][T31693] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:31 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200028}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0xac, r4, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb0b4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3d385237}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc1}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r5 = fcntl$dupfd(r0, 0x0, r2) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="bfbf4aeda373f02aecee1f8f861b348ce787d1d5d2bac93908ffa8fc54c69d38d2694e974a11eaeecfa525f6fcd36f34a06e18b944c7d1321e767a74239e5d56b550e54537d4ba0000ecd5ad23888a632708d585d5a2bab01aa23f3d21da681acb3afc7421310bbb3232b4588e620971a20b73f498b59da1f101eec6f5ca5a26f4d7caaae747914445260018c739b20300009533f442d1653261253d3905297386630600000025e99294995068650dd06df6b829f32724070682756182556434e46c98f72baee9"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:31 executing program 3: 00:37:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x806000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:31 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000010000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x900000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:31 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x68000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:31 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000020000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:31 executing program 3: 00:37:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xa00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1470.361680][T31687] FS-Cache: Duplicate cookie detected [ 1470.367141][T31687] FS-Cache: O-cookie c=00000000514d9f66 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1470.376098][T31687] FS-Cache: O-cookie d=00000000c744bfc3 n=000000007d525d3a [ 1470.383286][T31687] FS-Cache: O-key=[10] '0200020000807f000008' [ 1470.389510][T31687] FS-Cache: N-cookie c=00000000ffcc0acd [p=00000000a8002570 fl=2 nc=0 na=1] [ 1470.398212][T31687] FS-Cache: N-cookie d=00000000c744bfc3 n=000000005d7f6b54 [ 1470.405464][T31687] FS-Cache: N-key=[10] '0200020000807f000008' [ 1470.589896][T31749] FS-Cache: Duplicate cookie detected [ 1470.600341][T31749] FS-Cache: O-cookie c=00000000514d9f66 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1470.609458][T31749] FS-Cache: O-cookie d=00000000c744bfc3 n=000000007d525d3a [ 1470.616897][T31749] FS-Cache: O-key=[10] '0200020000807f000008' [ 1470.623240][T31749] FS-Cache: N-cookie c=00000000fbd87867 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1470.632058][T31749] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002b51d9f0 [ 1470.639464][T31749] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000180)={{0x3, 0x7ff}, 0x1, 0x8000, 0x16f, {0x100, 0x8}, 0x8, 0x2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:32 executing program 3: 00:37:32 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000110000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xc00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:32 executing program 3: 00:37:32 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000880000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:32 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6c000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xd00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 00:37:32 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000200000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1471.357690][T31754] FS-Cache: Duplicate cookie detected [ 1471.363166][T31754] FS-Cache: O-cookie c=000000003f9dbf20 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1471.372188][T31754] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000054f5de36 [ 1471.379397][T31754] FS-Cache: O-key=[10] '0200020000807f000008' [ 1471.385532][T31754] FS-Cache: N-cookie c=00000000d2ceb6b0 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1471.394197][T31754] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008b93bdcf [ 1471.401415][T31754] FS-Cache: N-key=[10] '0200020000807f000008' [ 1471.583370][T31807] FS-Cache: Duplicate cookie detected [ 1471.589073][T31807] FS-Cache: O-cookie c=000000003f9dbf20 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1471.598073][T31807] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000054f5de36 [ 1471.605309][T31807] FS-Cache: O-key=[10] '0200020000807f000008' [ 1471.611497][T31807] FS-Cache: N-cookie c=000000002a97d416 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1471.620199][T31807] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000bf15f9d8 [ 1471.627449][T31807] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:33 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:33 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000001100000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'ip6gretap0\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'tunl0\x00', 0x200}) 00:37:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:33 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000008800000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:33 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x74000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x1100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x894c, 0x0) 00:37:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:33 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000011000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1472.376169][T31811] FS-Cache: Duplicate cookie detected [ 1472.381736][T31811] FS-Cache: O-cookie c=00000000233c064c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1472.390747][T31811] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006d28391d [ 1472.397951][T31811] FS-Cache: O-key=[10] '0200020000807f000008' [ 1472.404018][T31811] FS-Cache: N-cookie c=0000000070cf6f86 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1472.412706][T31811] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000ff415f89 [ 1472.419934][T31811] FS-Cache: N-key=[10] '0200020000807f000008' [ 1472.563962][T31873] FS-Cache: Duplicate cookie detected [ 1472.570740][T31873] FS-Cache: O-cookie c=00000000233c064c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1472.579695][T31873] FS-Cache: O-cookie d=00000000c744bfc3 n=000000006d28391d [ 1472.587070][T31873] FS-Cache: O-key=[10] '0200020000807f000008' [ 1472.593457][T31873] FS-Cache: N-cookie c=000000006f9e9933 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1472.602262][T31873] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008bf0ca07 [ 1472.609629][T31873] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000006c0)=[0xee01]) r9 = getgid() getresgid(&(0x7f0000000700), &(0x7f0000000780), &(0x7f0000000840)=0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) getgroups(0x9, &(0x7f0000000940)=[r3, r4, r5, r6, r7, r8, r9, r10, r11]) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="639abc8638a686d9018bb0de13ee9c0a862ce4ecf399ac3b381d45829a45fdce815847ba39ddd1dd7ccc4d4b4208b5f8b1c16c8a00daf93422a9218f1c4129299d7b69cedecfdfd5512c17c5f2bad8820711262ae3e7b89d20cf8c333d91dbb86bfeeb6d3a783a528ba87c19a34b789facb68ef372afa8b2955ad62db4a06746"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:34 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000088000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@empty, 0x0, r2}) 00:37:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2800000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:34 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000001, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x40000ab11, 0x0) 00:37:34 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2900000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:34 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x78020000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1473.322077][T31868] FS-Cache: Duplicate cookie detected [ 1473.327846][T31868] FS-Cache: O-cookie c=00000000aa34433d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1473.336740][T31868] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000e25faaa3 [ 1473.343935][T31868] FS-Cache: O-key=[10] '0200020000807f000008' [ 1473.350075][T31868] FS-Cache: N-cookie c=00000000bd284d69 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1473.358761][T31868] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000075da43e1 [ 1473.365980][T31868] FS-Cache: N-key=[10] '0200020000807f000008' [ 1473.537525][T31932] FS-Cache: Duplicate cookie detected [ 1473.542962][T31932] FS-Cache: O-cookie c=00000000aa34433d [p=00000000a8002570 fl=222 nc=0 na=1] [ 1473.551933][T31932] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000e25faaa3 [ 1473.559161][T31932] FS-Cache: O-key=[10] '0200020000807f000008' [ 1473.565321][T31932] FS-Cache: N-cookie c=00000000d363428f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1473.573988][T31932] FS-Cache: N-cookie d=00000000c744bfc3 n=000000000ab08b7a [ 1473.581476][T31932] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="d4d6f3c10e36939cc33d285e4ab87efd013698f5f4760e715f86fe07ec67ea7e67caea260a2ed7da22cadd60ece0c13eb5ba92b4b113dd577e1cc4fd3bf8ac207e455048db30d29796e60a1d2a718b0b1a7d6a6de6d4389771599be0572bcbf02581883e77f2c244ac9f"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:35 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000200000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:35 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000180)={{0x3, 0x7ff}, 0x1, 0x8000, 0x16f, {0x100, 0x8}, 0x8, 0x2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2b00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:35 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000001100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000006c0)=[0xee01]) r9 = getgid() getresgid(&(0x7f0000000700), &(0x7f0000000780), &(0x7f0000000840)=0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) getgroups(0x9, &(0x7f0000000940)=[r3, r4, r5, r6, r7, r8, r9, r10, r11]) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="639abc8638a686d9018bb0de13ee9c0a862ce4ecf399ac3b381d45829a45fdce815847ba39ddd1dd7ccc4d4b4208b5f8b1c16c8a00daf93422a9218f1c4129299d7b69cedecfdfd5512c17c5f2bad8820711262ae3e7b89d20cf8c333d91dbb86bfeeb6d3a783a528ba87c19a34b789facb68ef372afa8b2955ad62db4a06746"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x2f00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1474.088926][T31985] FS-Cache: Duplicate cookie detected [ 1474.095132][T31985] FS-Cache: O-cookie c=00000000538ef4aa [p=00000000a8002570 fl=222 nc=0 na=1] [ 1474.104046][T31985] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a6d6fac3 [ 1474.111367][T31985] FS-Cache: O-key=[10] '0200020000807f000008' [ 1474.117800][T31985] FS-Cache: N-cookie c=0000000093f092b9 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1474.126717][T31985] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000c5ec0db8 [ 1474.134097][T31985] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:35 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x7a000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) [ 1474.314637][T31936] FS-Cache: Duplicate cookie detected [ 1474.320054][T31936] FS-Cache: O-cookie c=00000000538ef4aa [p=00000000a8002570 fl=222 nc=0 na=1] [ 1474.329023][T31936] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a6d6fac3 [ 1474.336242][T31936] FS-Cache: O-key=[10] '0200020000807f000008' [ 1474.342309][T31936] FS-Cache: N-cookie c=00000000baf8ea2a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1474.351024][T31936] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000085c5f861 [ 1474.358266][T31936] FS-Cache: N-key=[10] '0200020000807f000008' [ 1474.467590][T32000] FS-Cache: Duplicate cookie detected [ 1474.473065][T32000] FS-Cache: O-cookie c=00000000538ef4aa [p=00000000a8002570 fl=222 nc=0 na=1] [ 1474.482722][T32000] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000a6d6fac3 [ 1474.490032][T32000] FS-Cache: O-key=[10] '0200020000807f000008' [ 1474.496664][T32000] FS-Cache: N-cookie c=0000000025f1bc81 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1474.505551][T32000] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000788a069c [ 1474.512871][T32000] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:36 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x1) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x18, 0x7, 0x2, {{0xb, 'asymmetric\x00'}, 0x200}}, 0x18) socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:36 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000008800000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3300000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:36 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000002000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3a00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:36 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000011000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3b00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:36 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x68000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1474.924947][T32043] FS-Cache: Duplicate cookie detected [ 1474.930511][T32043] FS-Cache: O-cookie c=000000008e72452f [p=00000000a8002570 fl=222 nc=0 na=1] [ 1474.939424][T32043] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d670a291 [ 1474.946774][T32043] FS-Cache: O-key=[10] '0200020000807f000008' [ 1474.952884][T32043] FS-Cache: N-cookie c=00000000176e6659 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1474.961590][T32043] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000043e10a93 [ 1474.968845][T32043] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) semget$private(0x0, 0x4, 0x180) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="1a7b625e987b1fe4c984"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8001, 0x4100) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1475.100601][T32050] FS-Cache: Duplicate cookie detected [ 1475.106106][T32050] FS-Cache: O-cookie c=000000008e72452f [p=00000000a8002570 fl=222 nc=0 na=1] [ 1475.106118][T32050] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d670a291 [ 1475.106125][T32050] FS-Cache: O-key=[10] '0200020000807f000008' [ 1475.128336][T32050] FS-Cache: N-cookie c=00000000588b141c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1475.137065][T32050] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d186eebd [ 1475.137072][T32050] FS-Cache: N-key=[10] '0200020000807f000008' [ 1475.166004][T32062] FS-Cache: Duplicate cookie detected [ 1475.171484][T32062] FS-Cache: O-cookie c=000000008e72452f [p=00000000a8002570 fl=222 nc=0 na=1] [ 1475.180486][T32062] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d670a291 [ 1475.187710][T32062] FS-Cache: O-key=[10] '0200020000807f000008' [ 1475.193810][T32062] FS-Cache: N-cookie c=0000000000ecbb40 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1475.202523][T32062] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000811b9e2a [ 1475.209738][T32062] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:36 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x84000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:36 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000088000000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1475.282638][T32004] FS-Cache: Duplicate cookie detected [ 1475.288157][T32004] FS-Cache: O-cookie c=000000008e72452f [p=00000000a8002570 fl=222 nc=0 na=1] [ 1475.297160][T32004] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d670a291 [ 1475.304404][T32004] FS-Cache: O-key=[10] '0200020000807f000008' [ 1475.310498][T32004] FS-Cache: N-cookie c=00000000e95fabc4 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1475.319218][T32004] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000f8261052 [ 1475.326437][T32004] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3f00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:36 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000110000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:37 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000880000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1475.593675][T32102] FS-Cache: Duplicate cookie detected [ 1475.599255][T32102] FS-Cache: O-cookie c=00000000a634dc2c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1475.608346][T32102] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cc68a486 [ 1475.615570][T32102] FS-Cache: O-key=[10] '0200020000807f000008' [ 1475.621666][T32102] FS-Cache: N-cookie c=0000000060bc446e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1475.630375][T32102] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004d7796a5 [ 1475.637604][T32102] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4305000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x4400000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:37 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200028}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0xac, r4, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb0b4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3d385237}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc1}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) r5 = fcntl$dupfd(r0, 0x0, r2) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="bfbf4aeda373f02aecee1f8f861b348ce787d1d5d2bac93908ffa8fc54c69d38d2694e974a11eaeecfa525f6fcd36f34a06e18b944c7d1321e767a74239e5d56b550e54537d4ba0000ecd5ad23888a632708d585d5a2bab01aa23f3d21da681acb3afc7421310bbb3232b4588e620971a20b73f498b59da1f101eec6f5ca5a26f4d7caaae747914445260018c739b20300009533f442d1653261253d3905297386630600000025e99294995068650dd06df6b829f32724070682756182556434e46c98f72baee9"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1475.977896][T32118] FS-Cache: Duplicate cookie detected [ 1475.983373][T32118] FS-Cache: O-cookie c=00000000a634dc2c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1475.992494][T32118] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cc68a486 [ 1475.999730][T32118] FS-Cache: O-key=[10] '0200020000807f000008' [ 1476.005902][T32118] FS-Cache: N-cookie c=000000007ab7bdd8 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1476.014694][T32118] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000044facf1a [ 1476.021912][T32118] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:37 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x1000, 0x0, 0xc0000000000, 0x7ff}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000300)={r4, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f00000003c0)=0x84) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='veth0\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000000000000ba8208def6bac8040000004fac16f1e0432867e0641d5afc3511944069dafa52bc9afd992a514adba2f17e56aed8dd1ea90e042600d68857bf4bf4c9896639d50c5d2ff7a203c91f51675c2859759c3c796279148c42ac171298f103f9c69a52d1dce40a6b533f1829dd47aa"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) keyctl$update(0x2, r2, &(0x7f0000000500)="9e616ff05ce0", 0x6) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1476.032885][T32125] FS-Cache: Duplicate cookie detected [ 1476.038416][T32125] FS-Cache: O-cookie c=00000000a634dc2c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1476.047319][T32125] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cc68a486 [ 1476.054590][T32125] FS-Cache: O-key=[10] '0200020000807f000008' [ 1476.060722][T32125] FS-Cache: N-cookie c=00000000aba1980b [p=00000000a8002570 fl=2 nc=0 na=1] [ 1476.069474][T32125] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008650704a [ 1476.076721][T32125] FS-Cache: N-key=[10] '0200020000807f000008' [ 1476.197966][T32132] FS-Cache: Duplicate cookie detected [ 1476.203527][T32132] FS-Cache: O-cookie c=00000000a634dc2c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1476.212579][T32132] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cc68a486 [ 1476.219824][T32132] FS-Cache: O-key=[10] '0200020000807f000008' [ 1476.225962][T32132] FS-Cache: N-cookie c=000000001f9059bc [p=00000000a8002570 fl=2 nc=0 na=1] [ 1476.234679][T32132] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000044df9802 [ 1476.241877][T32132] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:37 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x84020000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x6c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:37 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000001000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, 0x0, &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8004020000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1476.492081][T32159] FS-Cache: Duplicate cookie detected [ 1476.497703][T32159] FS-Cache: O-cookie c=000000004754e3e6 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1476.506734][T32159] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000342b3732 [ 1476.510068][T32156] IPVS: ftp: loaded support on port[0] = 21 [ 1476.513921][T32159] FS-Cache: O-key=[10] '0200020000807f000008' [ 1476.513969][T32159] FS-Cache: N-cookie c=0000000031103602 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1476.513979][T32159] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000c8c32c90 00:37:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x800e000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1476.513989][T32159] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8035000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:38 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="5ec9602d3afca8dd7aeaa54d1255f70334b006"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1476.753500][T32156] chnl_net:caif_netlink_parms(): no params data found [ 1476.766016][T32191] device bridge_slave_1 left promiscuous mode [ 1476.796733][T32191] bridge0: port 2(bridge_slave_1) entered disabled state [ 1476.846554][T32173] FS-Cache: Duplicate cookie detected [ 1476.851989][T32173] FS-Cache: O-cookie c=000000004754e3e6 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1476.861264][T32173] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000342b3732 [ 1476.868634][T32173] FS-Cache: O-key=[10] '0200020000807f000008' [ 1476.875269][T32173] FS-Cache: N-cookie c=00000000c31f36c7 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1476.884015][T32173] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000873660ae [ 1476.891365][T32173] FS-Cache: N-key=[10] '0200020000807f000008' [ 1476.898379][T32191] device bridge_slave_0 left promiscuous mode [ 1476.911914][T32191] bridge0: port 1(bridge_slave_0) entered disabled state [ 1476.980288][T32135] FS-Cache: Duplicate cookie detected [ 1476.985787][T32135] FS-Cache: O-cookie c=000000004754e3e6 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1476.994723][T32135] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000342b3732 [ 1477.001914][T32135] FS-Cache: O-key=[10] '0200020000807f000008' [ 1477.008061][T32135] FS-Cache: N-cookie c=00000000baab1133 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1477.016793][T32135] FS-Cache: N-cookie d=00000000c744bfc3 n=000000005711178c [ 1477.023975][T32135] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:38 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) shmget$private(0x0, 0x3000, 0x9, &(0x7f0000ffd000/0x3000)=nil) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) getrusage(0x1, &(0x7f00000002c0)) [ 1477.119855][T32191] device hsr_slave_1 left promiscuous mode [ 1477.148121][T32188] FS-Cache: Duplicate cookie detected [ 1477.153731][T32188] FS-Cache: O-cookie c=000000004754e3e6 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1477.163284][T32188] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000342b3732 [ 1477.170728][T32188] FS-Cache: O-key=[10] '0200020000807f000008' [ 1477.177186][T32188] FS-Cache: N-cookie c=000000004aa452c5 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1477.186042][T32188] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a2830c2a [ 1477.193328][T32188] FS-Cache: N-key=[10] '0200020000807f000008' [ 1477.218204][T32191] device hsr_slave_0 left promiscuous mode 00:37:38 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x8cffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) [ 1477.292505][T32191] team0 (unregistering): Port device team_slave_1 removed [ 1477.343800][T32191] team0 (unregistering): Port device team_slave_0 removed [ 1477.373121][T32191] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1477.409501][T32210] FS-Cache: Duplicate cookie detected [ 1477.415202][T32210] FS-Cache: O-cookie c=0000000024f1aa82 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1477.424037][T32210] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005b89543f [ 1477.431257][T32210] FS-Cache: O-key=[10] '0200020000807f000008' [ 1477.437371][T32210] FS-Cache: N-cookie c=0000000043cd1e5e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1477.446086][T32210] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b83ee7e1 [ 1477.453270][T32210] FS-Cache: N-key=[10] '0200020000807f000008' [ 1477.466604][T32191] bond0 (unregistering): Releasing backup interface bond_slave_0 00:37:39 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x84020000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1477.562328][T32191] bond0 (unregistering): Released all slaves 00:37:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x84ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1477.701984][T32213] FS-Cache: Duplicate cookie detected [ 1477.708115][T32213] FS-Cache: O-cookie c=0000000024f1aa82 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1477.718162][T32213] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005b89543f [ 1477.725530][T32213] FS-Cache: O-key=[10] '0200020000807f000008' [ 1477.732067][T32213] FS-Cache: N-cookie c=000000004c8bfdcc [p=00000000a8002570 fl=2 nc=0 na=1] [ 1477.741032][T32213] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000906bdff4 [ 1477.748490][T32213] FS-Cache: N-key=[10] '0200020000807f000008' [ 1477.799020][T32156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.823619][T32156] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.833640][T32156] device bridge_slave_0 entered promiscuous mode [ 1477.841587][T32156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.849383][T32156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1477.857848][T32156] device bridge_slave_1 entered promiscuous mode [ 1477.878744][T32156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1477.889841][T32156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1477.922248][T32156] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1477.930470][T32156] team0: Port device team_slave_0 added [ 1477.937047][T32156] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1477.945615][T32156] team0: Port device team_slave_1 added [ 1477.951732][T32156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1477.969782][T32195] FS-Cache: Duplicate cookie detected [ 1477.975290][T32195] FS-Cache: O-cookie c=0000000024f1aa82 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1477.984561][T32195] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005b89543f [ 1477.991757][T32195] FS-Cache: O-key=[10] '0200020000807f000008' [ 1477.992025][T32156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1477.998062][T32195] FS-Cache: N-cookie c=000000001ea60419 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1477.998074][T32195] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000016cab455 [ 1477.998081][T32195] FS-Cache: N-key=[10] '0200020000807f000008' [ 1478.076329][T32156] device hsr_slave_0 entered promiscuous mode [ 1478.114614][T32156] device hsr_slave_1 entered promiscuous mode [ 1478.155675][T32156] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1478.174454][T32156] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1478.209655][T32156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.216852][T32156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1478.224199][T32156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.231302][T32156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1478.301861][T32156] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1478.316041][T32156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1478.333317][T32156] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1478.350676][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1478.361212][T30434] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.376967][T30434] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.391286][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1478.405564][T32156] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1478.412349][T32156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1478.432191][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1478.447573][T30434] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.454678][T30434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1478.480933][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1478.496939][T20970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.503980][T20970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1478.530642][T32156] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1478.541610][T32156] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1478.553047][T32156] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1478.562398][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1478.579102][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1478.591739][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1478.604610][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1478.618822][T32156] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1478.627875][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1478.639174][T30434] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1478.660564][T32156] 8021q: adding VLAN 0 to HW filter on device batadv0 00:37:40 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000002000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x86ddffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x2000000, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="310738a5147b7cc4ef1f7054a838d012ceba962f32362346c14d464ff2094e935cec809ff3eab0ca7d369f21c9f55371ff30ad881354"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x8, 0x20482) getpeername$ax25(r1, &(0x7f0000000180)={{0x3, @bcast}, [@remote, @netrom, @rose, @rose, @netrom, @null, @rose, @default]}, &(0x7f00000002c0)=0x48) 00:37:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 00:37:40 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xc0ed0000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:40 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f0000000040)=0x1, 0x4) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x87ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:40 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000011000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:40 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x40000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1479.046653][T32271] FS-Cache: Duplicate cookie detected [ 1479.052108][T32271] FS-Cache: O-cookie c=0000000006e14fec [p=00000000a8002570 fl=222 nc=0 na=1] [ 1479.061037][T32271] FS-Cache: O-cookie d=00000000c744bfc3 n=000000000c25edf6 [ 1479.068274][T32271] FS-Cache: O-key=[10] '0200020000807f000008' [ 1479.074427][T32271] FS-Cache: N-cookie c=00000000292a4621 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1479.083095][T32271] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000190bc4c7 [ 1479.090336][T32271] FS-Cache: N-key=[10] '0200020000807f000008' [ 1479.122821][T32259] FS-Cache: Duplicate cookie detected [ 1479.128829][T32259] FS-Cache: O-cookie c=0000000006e14fec [p=00000000a8002570 fl=222 nc=0 na=1] [ 1479.140234][T32259] FS-Cache: O-cookie d=00000000c744bfc3 n=000000000c25edf6 [ 1479.147581][T32259] FS-Cache: O-key=[10] '0200020000807f000008' [ 1479.154129][T32259] FS-Cache: N-cookie c=00000000d852cd8c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1479.162963][T32259] FS-Cache: N-cookie d=00000000c744bfc3 n=000000007496250e 00:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8847000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1479.170409][T32259] FS-Cache: N-key=[10] '0200020000807f000008' [ 1479.220518][T32294] FS-Cache: Duplicate cookie detected [ 1479.227348][T32294] FS-Cache: O-cookie c=0000000006e14fec [p=00000000a8002570 fl=222 nc=0 na=1] [ 1479.236571][T32294] FS-Cache: O-cookie d=00000000c744bfc3 n=000000000c25edf6 [ 1479.243846][T32294] FS-Cache: O-key=[10] '0200020000807f000008' [ 1479.250155][T32294] FS-Cache: N-cookie c=00000000197677c4 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1479.258921][T32294] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000f708c6ad 00:37:40 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000088000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1479.266249][T32294] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8848000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:40 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000380)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x420001}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=@getqdisc={0x4c, 0x26, 0x400, 0x70bd25, 0x25dfdbfe, {0x0, r2, {0xfffb, 0xffff}, {0x7, 0x7}, {0x0, 0xf}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0xc0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r4 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r3) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000000040)='R\trist\xe3cusgrVid:De', 0xfffffffffffffffb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="d5e4c11c75b814101acc0e7e0e462fe542e7018f349fef738b971b01e69efbd4651be56165514ca42a8aeb1670b3c528a794c411fd00ce941fbe3aba7c340d06d03840d68871ca98d52351ba0300000000000000caf900f65f817d0c013af127353545a95c"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:40 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000020000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8864000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1479.485821][T32324] FS-Cache: Duplicate cookie detected [ 1479.491400][T32324] FS-Cache: O-cookie c=0000000006e14fec [p=00000000a8002570 fl=222 nc=0 na=1] [ 1479.501605][T32324] FS-Cache: O-cookie d=00000000c744bfc3 n=000000000c25edf6 [ 1479.508899][T32324] FS-Cache: O-key=[10] '0200020000807f000008' [ 1479.515156][T32324] FS-Cache: N-cookie c=00000000a993daad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1479.523986][T32324] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000142bb969 [ 1479.531320][T32324] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000110000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:41 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xe0020000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 00:37:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000880000000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1479.910927][T32346] FS-Cache: Duplicate cookie detected [ 1479.916520][T32346] FS-Cache: O-cookie c=00000000e3fe364b [p=00000000a8002570 fl=222 nc=0 na=1] [ 1479.925529][T32346] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008c51af30 [ 1479.932798][T32346] FS-Cache: O-key=[10] '0200020000807f000008' [ 1479.938936][T32346] FS-Cache: N-cookie c=00000000645133b5 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1479.947635][T32346] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000fa568b6d [ 1479.954881][T32346] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88caffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000001100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:41 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xec030000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1480.066206][T32372] FS-Cache: Duplicate cookie detected [ 1480.071657][T32372] FS-Cache: O-cookie c=00000000e3fe364b [p=00000000a8002570 fl=222 nc=0 na=1] [ 1480.080757][T32372] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008c51af30 [ 1480.087967][T32372] FS-Cache: O-key=[10] '0200020000807f000008' [ 1480.094061][T32372] FS-Cache: N-cookie c=00000000eb566b1f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1480.102777][T32372] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000f29ec676 [ 1480.109988][T32372] FS-Cache: N-key=[10] '0200020000807f000008' [ 1480.162900][T32378] FS-Cache: Duplicate cookie detected [ 1480.168677][T32378] FS-Cache: O-cookie c=00000000e3fe364b [p=00000000a8002570 fl=222 nc=0 na=1] [ 1480.178734][T32378] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008c51af30 [ 1480.186109][T32378] FS-Cache: O-key=[10] '0200020000807f000008' [ 1480.192705][T32378] FS-Cache: N-cookie c=00000000eda7c50c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1480.201515][T32378] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000074e1a4f7 [ 1480.208837][T32378] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000008800000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x88ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1480.275075][T32386] FS-Cache: Duplicate cookie detected [ 1480.280675][T32386] FS-Cache: O-cookie c=00000000e3fe364b [p=00000000a8002570 fl=222 nc=0 na=1] [ 1480.289637][T32386] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008c51af30 [ 1480.296881][T32386] FS-Cache: O-key=[10] '0200020000807f000008' [ 1480.302995][T32386] FS-Cache: N-cookie c=00000000c99c3592 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1480.311719][T32386] FS-Cache: N-cookie d=00000000c744bfc3 n=000000006014eafe [ 1480.318928][T32386] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:41 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000010e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8906000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1480.490282][T32399] FS-Cache: Duplicate cookie detected [ 1480.496432][T32399] FS-Cache: O-cookie c=00000000e3fe364b [p=00000000a8002570 fl=222 nc=0 na=1] [ 1480.505567][T32399] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008c51af30 [ 1480.512853][T32399] FS-Cache: O-key=[10] '0200020000807f000008' [ 1480.519459][T32399] FS-Cache: N-cookie c=00000000dd667bc2 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1480.528213][T32399] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000084af5b11 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000020e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1480.535622][T32399] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x89ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:42 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="93481e7407e3975a1ba099295a1c5261ab327801df223687aaa2d87baf8cda86e0fe0cf7a61a5b6b72fc72af64ab12e65de4d6f48609a580273a327ebb1ae9"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x8dffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000110e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1480.973028][T32383] FS-Cache: Duplicate cookie detected [ 1480.978606][T32383] FS-Cache: O-cookie c=0000000046e0c376 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1480.987499][T32383] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005634e3b2 [ 1480.994715][T32383] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.000803][T32383] FS-Cache: N-cookie c=000000005c6c1649 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.000813][T32383] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d1f14382 [ 1481.000819][T32383] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:42 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xf0ffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1481.030592][T32443] FS-Cache: Duplicate cookie detected [ 1481.036177][T32443] FS-Cache: O-cookie c=0000000046e0c376 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.045084][T32443] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005634e3b2 [ 1481.045092][T32443] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.045137][T32443] FS-Cache: N-cookie c=00000000cc9549ed [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.045146][T32443] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000e0ccaa10 [ 1481.045153][T32443] FS-Cache: N-key=[10] '0200020000807f000008' [ 1481.173743][T32457] FS-Cache: Duplicate cookie detected [ 1481.179746][T32457] FS-Cache: O-cookie c=0000000046e0c376 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.188874][T32457] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005634e3b2 [ 1481.196252][T32457] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.202847][T32457] FS-Cache: N-cookie c=000000003ede4b3a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.211665][T32457] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002b126a67 [ 1481.219191][T32457] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:42 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000180)=""/56) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x2) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xe803000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000880e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1481.300875][T32462] FS-Cache: Duplicate cookie detected [ 1481.306397][T32462] FS-Cache: O-cookie c=0000000046e0c376 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.315398][T32462] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005634e3b2 [ 1481.322597][T32462] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.328722][T32462] FS-Cache: N-cookie c=0000000093dce655 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.337432][T32462] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000fbdf2733 [ 1481.344646][T32462] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000200000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf401000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000001100000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:42 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000008800000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:43 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x20000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1481.683471][T32500] FS-Cache: Duplicate cookie detected [ 1481.689252][T32500] FS-Cache: O-cookie c=00000000aa34bf25 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.698151][T32500] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005beeeefd [ 1481.705369][T32500] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.705419][T32500] FS-Cache: N-cookie c=0000000020a687da [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.705428][T32500] FS-Cache: N-cookie d=00000000c744bfc3 n=000000009d8c6a5c [ 1481.705435][T32500] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000011000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1481.853624][T32519] FS-Cache: Duplicate cookie detected [ 1481.859279][T32519] FS-Cache: O-cookie c=00000000aa34bf25 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.868174][T32519] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005beeeefd [ 1481.875394][T32519] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.881496][T32519] FS-Cache: N-cookie c=000000004fe3b99c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.890204][T32519] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000000939719 [ 1481.890213][T32519] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:43 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xf6ffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1481.950118][T32450] FS-Cache: Duplicate cookie detected [ 1481.955717][T32450] FS-Cache: O-cookie c=00000000aa34bf25 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1481.964660][T32450] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005beeeefd [ 1481.971853][T32450] FS-Cache: O-key=[10] '0200020000807f000008' [ 1481.978132][T32450] FS-Cache: N-cookie c=000000007062f379 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1481.986830][T32450] FS-Cache: N-cookie d=00000000c744bfc3 n=000000009313c33f [ 1481.994021][T32450] FS-Cache: N-key=[10] '0200020000807f000008' [ 1482.084260][T32531] FS-Cache: Duplicate cookie detected [ 1482.092214][T32531] FS-Cache: O-cookie c=00000000aa34bf25 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1482.101767][T32531] FS-Cache: O-cookie d=00000000c744bfc3 n=000000005beeeefd [ 1482.109090][T32531] FS-Cache: O-key=[10] '0200020000807f000008' [ 1482.115568][T32531] FS-Cache: N-cookie c=00000000d9027094 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1482.124264][T32531] FS-Cache: N-cookie d=00000000c744bfc3 n=000000001bdde1a2 [ 1482.131811][T32531] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000088000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:43 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'sit0\x00', 0x4}) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfeffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xffffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000002000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:43 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) membarrier(0x1, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0xfffffffffffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:43 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000011000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1482.589898][T32570] FS-Cache: Duplicate cookie detected [ 1482.595524][T32570] FS-Cache: O-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1482.604437][T32570] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000dce39c1a [ 1482.611663][T32570] FS-Cache: O-key=[10] '0200020000807f000008' [ 1482.617793][T32570] FS-Cache: N-cookie c=00000000d9cd5562 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1482.626562][T32570] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000801a72af [ 1482.633744][T32570] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:44 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000088000e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1482.774874][T32595] FS-Cache: Duplicate cookie detected [ 1482.780504][T32595] FS-Cache: O-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1482.789466][T32595] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000dce39c1a [ 1482.796735][T32595] FS-Cache: O-key=[10] '0200020000807f000008' [ 1482.802840][T32595] FS-Cache: N-cookie c=0000000071817128 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1482.811570][T32595] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000c05a6281 [ 1482.818830][T32595] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:44 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xf9fdffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:44 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000110e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1482.885816][T32535] FS-Cache: Duplicate cookie detected [ 1482.891336][T32535] FS-Cache: O-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1482.900550][T32535] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000dce39c1a [ 1482.907781][T32535] FS-Cache: O-key=[10] '0200020000807f000008' [ 1482.913873][T32535] FS-Cache: N-cookie c=000000005597d0ad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1482.922571][T32535] FS-Cache: N-cookie d=00000000c744bfc3 n=000000007525fd72 [ 1482.929775][T32535] FS-Cache: N-key=[10] '0200020000807f000008' [ 1483.085814][T32611] FS-Cache: Duplicate cookie detected [ 1483.091402][T32611] FS-Cache: O-cookie c=00000000d2a22a51 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1483.101965][T32611] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000dce39c1a [ 1483.109304][T32611] FS-Cache: O-key=[10] '0200020000807f000008' [ 1483.115799][T32611] FS-Cache: N-cookie c=000000005564c488 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1483.124674][T32611] FS-Cache: N-cookie d=00000000c744bfc3 n=000000007660a46b [ 1483.131912][T32611] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:44 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8f, 0x200c80) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f0000000340)=0x6, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r3 = accept4(r0, &(0x7f0000000180)=@ethernet={0x0, @broadcast}, &(0x7f0000000040)=0x80, 0x80000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:44 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000880e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:44 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000020e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:44 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r1 = shmget(0x3, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="44c7283ac55fb23de2cce328ff6e7d01d686d74bc3062e96f0544bf54be151bd265c80ded0e83b3b62b30a3852bee656e829ddcd7135f78f36c723b4f66172405a5edbe52655915f50246b993b048f6cab126cf281b756383dc4b9e08a31e8926848b3d2db9e9b"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:44 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000110e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1483.517858][T32648] FS-Cache: Duplicate cookie detected [ 1483.523476][T32648] FS-Cache: O-cookie c=000000001690efde [p=00000000a8002570 fl=222 nc=0 na=1] [ 1483.532598][T32648] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cd5f4ddb [ 1483.542993][T32648] FS-Cache: O-key=[10] '0200020000807f000008' [ 1483.549674][T32648] FS-Cache: N-cookie c=0000000064340d19 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1483.558499][T32648] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000060c4c0fe [ 1483.565856][T32648] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:45 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000880e0000000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:45 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xfeffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1483.836245][T32616] FS-Cache: Duplicate cookie detected [ 1483.841719][T32616] FS-Cache: O-cookie c=000000001690efde [p=00000000a8002570 fl=222 nc=0 na=1] [ 1483.850662][T32616] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cd5f4ddb [ 1483.858189][T32616] FS-Cache: O-key=[10] '0200020000807f000008' [ 1483.864269][T32616] FS-Cache: N-cookie c=0000000027e30131 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1483.872970][T32616] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000e13625f9 [ 1483.880179][T32616] FS-Cache: N-key=[10] '0200020000807f000008' [ 1484.012049][T32683] FS-Cache: Duplicate cookie detected [ 1484.025417][T32683] FS-Cache: O-cookie c=000000001690efde [p=00000000a8002570 fl=222 nc=0 na=1] [ 1484.034498][T32683] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000cd5f4ddb [ 1484.041780][T32683] FS-Cache: O-key=[10] '0200020000807f000008' [ 1484.048420][T32683] FS-Cache: N-cookie c=000000003c20a082 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1484.057187][T32683] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000e6852ae8 [ 1484.064574][T32683] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:45 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000640)=ANY=[@ANYBLOB="ad00ef356615757d49c9390b009af25f9d1c071f6c2a3f1cc726fa6f2640d0ef9ddec27d7e40e739ca7ac984f5b5859cc50ccafe73c84ba401bffd493eae74be110cf40a2b88c97ef5538ac420b174ea9111f931349bad48ea491443ca0ed950187a4cef815b7fa802f973f2d35081ea741a9c785c2660ec8fbead444fe3977a25bafccd5c3e33724f736313f7ec7326d8183fb39685bdf33662ce1a79712d788a3662c70f19b6003201e3089787dad59a2413992bf8a4d6ff014b59ac49cd14f3d0ffd2ec20193336a09406f0e1ac2991ef0783078ad2eec1af2084771a64f15955026e5e119790cc3b"]) r1 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0xa33, 0x440982) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000500)={r0, r0, 0x0, 0x3d, &(0x7f0000000380)="1bdc1f116d4cf0d3d0f56d2a10c5b023875770bf33091be536be665ee5a2cf26b0fbf526eabc828b4f62c317939a758f4eedae926731ace948e5536449", 0x0, 0x0, 0x5, 0x6, 0x2, 0x1, 0xf90, 'syz0\x00'}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xaa, 0x80200) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:45 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0200000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x7]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) 00:37:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:45 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e1100000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x9]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1484.403278][T32724] FS-Cache: Duplicate cookie detected [ 1484.408814][T32724] FS-Cache: O-cookie c=00000000ab1e1ec9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1484.417845][T32724] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d1787c4c [ 1484.417852][T32724] FS-Cache: O-key=[10] '0200020000807f000008' [ 1484.417890][T32724] FS-Cache: N-cookie c=00000000cd17ebf4 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1484.417898][T32724] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000cf74fcb1 [ 1484.417903][T32724] FS-Cache: N-key=[10] '0200020000807f000008' [ 1484.457288][T32730] FS-Cache: Duplicate cookie detected [ 1484.462723][T32730] FS-Cache: O-cookie c=00000000ab1e1ec9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1484.471783][T32730] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d1787c4c [ 1484.479017][T32730] FS-Cache: O-key=[10] '0200020000807f000008' [ 1484.485140][T32730] FS-Cache: N-cookie c=00000000629ed071 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1484.485150][T32730] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000eacb83e7 [ 1484.485158][T32730] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:46 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xfffffdf9, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e8800000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1484.774495][T32689] FS-Cache: Duplicate cookie detected [ 1484.780063][T32689] FS-Cache: O-cookie c=00000000ab1e1ec9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1484.788937][T32689] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d1787c4c [ 1484.796157][T32689] FS-Cache: O-key=[10] '0200020000807f000008' [ 1484.802238][T32689] FS-Cache: N-cookie c=000000009ddf8c8e [p=00000000a8002570 fl=2 nc=0 na=1] [ 1484.810937][T32689] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d049c1dc [ 1484.818504][T32689] FS-Cache: N-key=[10] '0200020000807f000008' [ 1484.942300][T32748] FS-Cache: Duplicate cookie detected [ 1484.948011][T32748] FS-Cache: O-cookie c=00000000ab1e1ec9 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1484.957043][T32748] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000d1787c4c [ 1484.964521][T32748] FS-Cache: O-key=[10] '0200020000807f000008' [ 1484.970898][T32748] FS-Cache: N-cookie c=00000000be49250f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1484.980330][T32748] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a5ccbe75 [ 1484.987784][T32748] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) socketpair(0xa, 0x3, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x1, 0x4, 0x3fe00000000000, 0x1}, 0x8) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xa]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0011000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xc]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:46 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x7, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000ac0)=""/4096) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) fallocate(r0, 0x16, 0x5d, 0x200) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1ff, 0x10000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x1b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x401}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000002c0)={r3, 0xdc, "b3f49138b0ec251625ef0a499a288d3e6e517ed3fc1605bb6476c37a77085b40977d8cb39212052ae84afb782b3ffc5da135e39c5b3a9d502056a05524afdc591a12851552bec26603f7d9b022d208bd110cbf33574f4fef6f50f14f964c44146811d1c7e6f4357d97dba5c86e515822c398e2e6ed61704fc43459f39f033ed8278c8adcdc0e7b18b62e6d3ba20674aa3546b914d2ec0046ba50ed4778df902282440361dd6403f0f0b8793e3c46d4551e28965d0bc71a92767917e7db1135371a6ee85ea03b526c3d15b3cbccd662cae4e030211e569fb1de00c7db"}, &(0x7f00000003c0)=0xe4) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0088000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:46 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0002000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xd]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100, 0x2000) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000180)={0x3, &(0x7f00000000c0)=[{0x44, 0x7f, 0x100000001, 0x9}, {0x1f00000, 0x1, 0x9, 0x4}, {0xc896, 0x1, 0x2, 0x100000001}]}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f00000002c0)=ANY=[@ANYBLOB="3b521c3ef1ed6c218e1969c8bc95e0df7f0f45281bf64c93e0996aaf83ae27dcd2cfb15ab99237ee1348ffed13ac379c47763551e49148e481c07b31eacd0ad92033e3a50b6f2bda89128de5982f0d7d77792468ae9b6d6c7f65a3eacc3659f77011f38b991a0e12738c8396796362290e79b5a653cacdbc7fd90a2e06a166c85d351056b20253"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x1, 0x20, 0x7, 0x8000}, {0x90, 0xe4a, 0x8}, {0x6, 0x2, 0x8, 0xff}]}) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000006c0)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1485.576190][ T339] FS-Cache: Duplicate cookie detected [ 1485.581969][ T339] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1485.592813][ T339] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008a7d0b3b [ 1485.600224][ T339] FS-Cache: O-key=[10] '0200020000807f000008' [ 1485.606526][ T339] FS-Cache: N-cookie c=00000000e062fb80 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1485.615311][ T339] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000007977857 [ 1485.622596][ T339] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:47 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xffffff7f, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0011000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:47 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x7, 0x780) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000ac0)=""/4096) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) fallocate(r0, 0x16, 0x5d, 0x200) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1ff, 0x10000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x1b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x401}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000002c0)={r3, 0xdc, "b3f49138b0ec251625ef0a499a288d3e6e517ed3fc1605bb6476c37a77085b40977d8cb39212052ae84afb782b3ffc5da135e39c5b3a9d502056a05524afdc591a12851552bec26603f7d9b022d208bd110cbf33574f4fef6f50f14f964c44146811d1c7e6f4357d97dba5c86e515822c398e2e6ed61704fc43459f39f033ed8278c8adcdc0e7b18b62e6d3ba20674aa3546b914d2ec0046ba50ed4778df902282440361dd6403f0f0b8793e3c46d4551e28965d0bc71a92767917e7db1135371a6ee85ea03b526c3d15b3cbccd662cae4e030211e569fb1de00c7db"}, &(0x7f00000003c0)=0xe4) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1485.725587][ T346] FS-Cache: Duplicate cookie detected [ 1485.731095][ T346] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1485.740128][ T346] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008a7d0b3b [ 1485.747365][ T346] FS-Cache: O-key=[10] '0200020000807f000008' [ 1485.753451][ T346] FS-Cache: N-cookie c=000000000e70dead [p=00000000a8002570 fl=2 nc=0 na=1] [ 1485.762139][ T346] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000083759a7a [ 1485.769373][ T346] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x11]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0088000400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1485.941848][ T358] FS-Cache: Duplicate cookie detected [ 1485.947469][ T358] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1485.956365][ T358] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008a7d0b3b [ 1485.963567][ T358] FS-Cache: O-key=[10] '0200020000807f000008' [ 1485.969723][ T358] FS-Cache: N-cookie c=0000000095be6eba [p=00000000a8002570 fl=2 nc=0 na=1] [ 1485.978460][ T358] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000087a342af [ 1485.985721][ T358] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000110400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1485.999157][ T364] FS-Cache: Duplicate cookie detected [ 1486.004813][ T364] FS-Cache: O-cookie c=00000000182188b4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1486.013828][ T364] FS-Cache: O-cookie d=00000000c744bfc3 n=000000008a7d0b3b [ 1486.021082][ T364] FS-Cache: O-key=[10] '0200020000807f000008' [ 1486.027236][ T364] FS-Cache: N-cookie c=00000000662a4156 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1486.035937][ T364] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002d49dd2b [ 1486.043145][ T364] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x21]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:47 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000880400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x28]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f00000002c0)=""/222) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x1d909f2c, 0x3b7, 0x8, 0x4a2]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000ac0)=ANY=[@ANYBLOB="8ac2159d3862ea06000000a59407fb62df9a3bada9746aa9efc7078e955eb1af9da4e26a23591fb13f36cbcd95cd3dba7c4d4a13370602284ef5b9252bb26a285b64f1b47fb8ed2a087a3e000001a9e4df7f50ba9bcde9ff063677752eddb67758f2dff77bf3b0daeb51f539db31ed9dcdc4f8b55a7ed9fcd4b9cc4672d2394bef1cf432872e26b2d67fd4053bffcd1e52b5e3958478d994732d8dbe2d1580cf4c6bedb9544420ae749d48e058239b02d66a7a8b173b254a1aff714fde0d777a303f5d20f11ee9849392f472a2be299f0986d21c0127e5b96fb1bf7094626a1fa0e5f352c1d37e6a627c8be3c3e79484ce17ffb3620c53ba4752d9c92c5db010abade2617f8d6e878cc11e5c61afbfeaa1e61ba2a54f5606fe1600fde59b1ece8ae6691d5157ebbd884bd873722675a5264c53f4061e43097ca957334d19dfb70fddafca8f1a7ad113cec357ac27caa0babefeb5c206416f3c3be8583bb8f04252b9ee6bb719200cd08e08250f9642580df8ba58e8b055c22f4519a674de770db2d071ac1e8a773f4e1d2e89ebcf8faf7af50758831c1604a05c81a02e226519b65375087beb645f4557b7f75400d0f5879ca7ff4396a66854d7e51b1423cb6a29d5fb124d73cb40f81a28967602b5f9194b642ecea11b1628d38ed08e60b15ed4027e4ea1136d880000000000000004d99557755ca32de6af52e45cef7d23d45a420135db085425ecc22a000000000000000000000000006adc0a255bb8ade25e483055ce08b84c895dd0d6db723fbe0fc4d4149aba36ef1d8585267d7d937cab9263baabe47a3601"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x6, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1486.357085][ T408] FS-Cache: Duplicate cookie detected [ 1486.362495][ T408] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1486.371520][ T408] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ba4e2ebc [ 1486.378768][ T408] FS-Cache: O-key=[10] '0200020000807f000008' [ 1486.384882][ T408] FS-Cache: N-cookie c=00000000dee6e33f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1486.393541][ T408] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000ab1474a5 [ 1486.400760][ T408] FS-Cache: N-key=[10] '0200020000807f000008' [ 1486.473986][ T413] FS-Cache: Duplicate cookie detected [ 1486.480328][ T413] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1486.489360][ T413] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ba4e2ebc [ 1486.496779][ T413] FS-Cache: O-key=[10] '0200020000807f000008' [ 1486.503371][ T413] FS-Cache: N-cookie c=000000009c948bd4 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1486.512089][ T413] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000302bb666 [ 1486.519425][ T413] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:48 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xffffff8c, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000020400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x29]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:48 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x6c00, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1486.692778][ T369] FS-Cache: Duplicate cookie detected [ 1486.698393][ T369] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1486.707271][ T369] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ba4e2ebc [ 1486.714470][ T369] FS-Cache: O-key=[10] '0200020000807f000008' [ 1486.720535][ T369] FS-Cache: N-cookie c=0000000006d0af17 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1486.729235][ T369] FS-Cache: N-cookie d=00000000c744bfc3 n=000000000c2b1fec [ 1486.736482][ T369] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000110400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1486.842404][ T427] FS-Cache: Duplicate cookie detected [ 1486.847959][ T427] FS-Cache: O-cookie c=000000001611478e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1486.856877][ T427] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000ba4e2ebc [ 1486.864064][ T427] FS-Cache: O-key=[10] '0200020000807f000008' [ 1486.870222][ T427] FS-Cache: N-cookie c=000000007e2fdea2 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1486.879034][ T427] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d3fc1f9d [ 1486.886339][ T427] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000880400001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2f]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x33]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1487.138008][ T446] FS-Cache: Duplicate cookie detected [ 1487.143576][ T446] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1487.152637][ T446] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000202e0e56 [ 1487.159887][ T446] FS-Cache: O-key=[10] '0200020000807f000008' [ 1487.166011][ T446] FS-Cache: N-cookie c=00000000f07cbe3a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1487.174720][ T446] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000ea82115a [ 1487.181906][ T446] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:48 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0x7, 0x8, 0x10000, 0xffffffffffffffff, 0x5fe, 0x9, 0x5}) 00:37:48 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000000000850032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:48 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xfffffff0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3a]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1487.328069][ T485] FS-Cache: Duplicate cookie detected [ 1487.333472][ T485] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1487.342400][ T485] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000202e0e56 [ 1487.349785][ T485] FS-Cache: O-key=[10] '0200020000807f000008' [ 1487.355934][ T485] FS-Cache: N-cookie c=000000006eddd74d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1487.364621][ T485] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000647d5ea3 [ 1487.371789][ T485] FS-Cache: N-key=[10] '0200020000807f000008' [ 1487.469870][ T491] FS-Cache: Duplicate cookie detected [ 1487.475373][ T491] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1487.484208][ T491] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000202e0e56 [ 1487.491458][ T491] FS-Cache: O-key=[10] '0200020000807f000008' [ 1487.497638][ T491] FS-Cache: N-cookie c=000000004256a80d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1487.506383][ T491] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003cd25bf7 [ 1487.513572][ T491] FS-Cache: N-key=[10] '0200020000807f000008' [ 1487.563313][ T503] FS-Cache: Duplicate cookie detected [ 1487.569097][ T503] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1487.578182][ T503] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000202e0e56 [ 1487.585425][ T503] FS-Cache: O-key=[10] '0200020000807f000008' [ 1487.591821][ T503] FS-Cache: N-cookie c=00000000eca81e93 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1487.600667][ T503] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000078b7732 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3b]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:49 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f00000002c0)=""/222) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x1d909f2c, 0x3b7, 0x8, 0x4a2]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x6, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1487.608101][ T503] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1487.765669][ T511] FS-Cache: Duplicate cookie detected [ 1487.771237][ T511] FS-Cache: O-cookie c=00000000f0bea8d4 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1487.780450][ T511] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000202e0e56 [ 1487.787858][ T511] FS-Cache: O-key=[10] '0200020000807f000008' [ 1487.794458][ T511] FS-Cache: N-cookie c=00000000089b12f9 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1487.803240][ T511] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000984eb80a 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x44]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1487.810958][ T511] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x6c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:49 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xf0]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:49 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x104]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000402001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:51 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r2 = dup(r0) ioctl$KVM_SMI(r2, 0xaeb7) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x80, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f00000001c0)={0x2, 0x1, [0x800, 0x4, 0x3, 0x0, 0x7, 0xfff, 0xf53d, 0x2]}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) r4 = open(&(0x7f0000000040)='./file0/file0\x00', 0x400, 0x1) ioctl$VIDIOC_CROPCAP(r4, 0xc02c563a, &(0x7f00000000c0)={0x80000000000000, {0x5f5f, 0x1, 0x10000000000ef32, 0x2}, {0xfffffffffffffffe, 0x2, 0x1fff, 0x40}, {0x7, 0x2}}) 00:37:51 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xfffffff6, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x1f4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:51 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r2) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f00000002c0)=""/222) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x1d909f2c, 0x3b7, 0x8, 0x4a2]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x6, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000411001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:51 executing program 3: mkdir(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:51 executing program 3: mkdir(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1489.958272][ T586] FS-Cache: Duplicate cookie detected [ 1489.963816][ T586] FS-Cache: O-cookie c=00000000409c890c [p=00000000a8002570 fl=222 nc=0 na=1] [ 1489.973135][ T586] FS-Cache: O-cookie d=00000000c744bfc3 n=000000004cedfac2 [ 1489.980568][ T586] FS-Cache: O-key=[10] '0200020000807f000008' [ 1489.987148][ T586] FS-Cache: N-cookie c=0000000038a2e2d7 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1489.995962][ T586] FS-Cache: N-cookie d=00000000c744bfc3 n=000000004559a188 00:37:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3e8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1490.003315][ T586] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:51 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xfffffffe, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000488001150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:51 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0x7, 0x8, 0x10000, 0xffffffffffffffff, 0x5fe, 0x9, 0x5}) 00:37:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4, 0x2) getsockopt$nfc_llcp(r1, 0x118, 0x3, 0x0, 0xfffffffffffffc80) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f00000000c0)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:51 executing program 3: mkdir(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400111150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x500]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1490.438801][ T657] FS-Cache: Duplicate cookie detected [ 1490.445172][ T657] FS-Cache: O-cookie c=00000000bacd447e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1490.454348][ T657] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000de003f77 [ 1490.461742][ T657] FS-Cache: O-key=[10] '0200020000807f000008' [ 1490.468532][ T657] FS-Cache: N-cookie c=00000000d7750259 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1490.477310][ T657] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000058b03d0f 00:37:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x543]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1490.484694][ T657] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:51 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400881150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0xedc000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x600]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1490.617781][ T672] FS-Cache: Duplicate cookie detected [ 1490.623313][ T672] FS-Cache: O-cookie c=00000000bacd447e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1490.632271][ T672] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000de003f77 [ 1490.639610][ T672] FS-Cache: O-key=[10] '0200020000807f000008' [ 1490.645765][ T672] FS-Cache: N-cookie c=000000006e379f8c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1490.654557][ T672] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000060569c99 [ 1490.661777][ T672] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:52 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400021150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1490.887288][ T691] FS-Cache: Duplicate cookie detected [ 1490.892759][ T691] FS-Cache: O-cookie c=00000000bacd447e [p=00000000a8002570 fl=222 nc=0 na=1] [ 1490.901891][ T691] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000de003f77 [ 1490.909130][ T691] FS-Cache: O-key=[10] '0200020000807f000008' [ 1490.915265][ T691] FS-Cache: N-cookie c=000000009fa95e23 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1490.915276][ T691] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000c8d5fc14 [ 1490.915282][ T691] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:52 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='\x04symtric\x00', &(0x7f0000001ffb)={'\x00', 0x1}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:52 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xffffffffffffffbe, 0xfffffffffffffff8) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:52 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400111150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x1000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:52 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400881150032200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x700]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1491.359282][ T735] FS-Cache: Duplicate cookie detected [ 1491.365560][ T735] FS-Cache: O-cookie c=0000000003c967d8 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1491.380735][ T735] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000b175df0b [ 1491.388230][ T735] FS-Cache: O-key=[10] '0200020000807f000008' [ 1491.394827][ T735] FS-Cache: N-cookie c=000000006d146943 [p=00000000a8002570 fl=2 nc=0 na=1] 00:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:52 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000011bfffff1fc0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1491.403585][ T735] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000448c372d [ 1491.410889][ T735] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:52 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='\x04symtric\x00', &(0x7f0000001ffb)={'\x00', 0x1}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x806]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x4000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1491.632970][ T775] FS-Cache: Duplicate cookie detected [ 1491.638717][ T775] FS-Cache: O-cookie c=0000000003c967d8 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1491.648184][ T775] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000b175df0b [ 1491.655540][ T775] FS-Cache: O-key=[10] '0200020000807f000008' [ 1491.661907][ T775] FS-Cache: N-cookie c=000000004ea1ab4f [p=00000000a8002570 fl=2 nc=0 na=1] [ 1491.670834][ T775] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000a3fd2815 [ 1491.678469][ T775] FS-Cache: N-key=[10] '0200020000807f000008' [ 1491.720219][ T780] FS-Cache: Duplicate cookie detected [ 1491.726896][ T780] FS-Cache: O-cookie c=0000000003c967d8 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1491.735911][ T780] FS-Cache: O-cookie d=00000000c744bfc3 n=00000000b175df0b [ 1491.743177][ T780] FS-Cache: O-key=[10] '0200020000807f000008' [ 1491.749546][ T780] FS-Cache: N-cookie c=00000000e9ba9a51 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1491.758463][ T780] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000089d82d62 [ 1491.765789][ T780] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:53 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x202, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000004, 0x1013, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0x2c, 0x0, &(0x7f00000002c0)=[@clear_death={0x400c630f, 0x1, 0x3}, @free_buffer={0x40086303, r2}, @clear_death={0x400c630f, 0x2}], 0x27, 0x0, &(0x7f0000000300)="5d3c970f35a99fa326e2f845bd6f5f9ae1d56f8f529dfcbf2d43ae50594bddcd799e28b3945792"}) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x40c2) write$tun(r3, &(0x7f0000000180)={@val={0x0, 0x8808}, @val={0x3, 0x7, 0x1, 0x1b3f, 0x0, 0x80000000}, @x25={0x1, 0x4, 0xf7, "5e60553319d57ebffdfa8675a838bfe397b0a4f5ac061da47e4b56b0eaa014ae6ef858989a448e1d92d7622cc8e5e79a5f6a7f0ff1422f41a2863effa53f15819b0aa5ab602d3320"}}, 0x59) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x900]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xa00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xc00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xd00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:55 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000011200a2220c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:55 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000340)={0x3, 0x1, @stop_pts=0x9}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x101100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000001c0)={0x3, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000002c0)={r5, 0xc3}) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000003c0), &(0x7f0000000480)=0x4) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r3) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB="8ae3cb4e80cefe81279afdcae211aabd0a667a676bd92064d9025a13e200e39363fbd4de84adeb0b8d5211a325e962374dc925f6af96e02f14a4a8e1d3c297b482790c61476517d0dae88145d5f0c7e480a42392f9731d10a4eea7b3b48c97c379a3a6edad7178fa21fbdb7e16c11f58ba9a3dd9efbb0b3295b8cda20325a20f741500c1b573690b2da4ae6134c9ea59318b82552c14e78a92a6db5eed19545be4e8f3c3c84f7a1bc7193025e83327cfb8c85054d36156c7a8cbba69b8f0888beac7b7f856b6e8a706ca58fbabad9ed6acdfcd84b90a32f8c9afde607a8cd5a75d174c7966cd2775a56b2f04a4e18ddebfbad706644c34634b9fc999c477ca88b7061c8b5d4499b9541af1ec5b3ba504ec4a6fa79822ed1142982e6aa2fe2b68e30d28797df4991e18360bd1cd2d3bd0593e13bca6cd63d3"]) socket$inet_udp(0x2, 0x2, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) fsetxattr$security_ima(r2, &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "c78bf9bb3cc0d713f2a706e4c83462dad41952"}, 0x14, 0x0) 00:37:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xe00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:55 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='\x04symtric\x00', &(0x7f0000001ffb)={'\x00', 0x1}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:55 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x100000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0xe80]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1494.352162][ T847] FS-Cache: Duplicate cookie detected [ 1494.359159][ T847] FS-Cache: O-cookie c=0000000025d962b1 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1494.368114][ T847] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000089fa1be0 [ 1494.375530][ T847] FS-Cache: O-key=[10] '0200020000807f000008' [ 1494.381924][ T847] FS-Cache: N-cookie c=0000000065590054 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1494.390744][ T847] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b0717654 [ 1494.398071][ T847] FS-Cache: N-key=[10] '0200020000807f000008' [ 1494.411653][ T836] FS-Cache: Duplicate cookie detected [ 1494.417637][ T836] FS-Cache: O-cookie c=0000000025d962b1 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1494.426628][ T836] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000089fa1be0 [ 1494.433825][ T836] FS-Cache: O-key=[10] '0200020000807f000008' [ 1494.439965][ T836] FS-Cache: N-cookie c=00000000db499809 [p=00000000a8002570 fl=2 nc=0 na=1] 00:37:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x1100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:55 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150042200c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1494.448660][ T836] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000d645da66 [ 1494.455894][ T836] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032202c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000180)=ANY=[@ANYBLOB="011cc2594d68596823f0dc2b51cb8df94c80260879fc0232c64553a6d0cda4d4f1bd432e279493bbe347755005af7dffc8a2576391b4d00adf73a41c449027b627"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1495.106133][ T840] FS-Cache: Duplicate cookie detected [ 1495.111560][ T840] FS-Cache: O-cookie c=0000000058123d82 [p=00000000a8002570 fl=212 nc=0 na=0] [ 1495.120527][ T840] FS-Cache: O-cookie d= (null) n= (null) [ 1495.127864][ T840] FS-Cache: O-key=[10] '0200020000807f000008' [ 1495.133944][ T840] FS-Cache: N-cookie c=000000005db3a05c [p=00000000a8002570 fl=2 nc=0 na=1] [ 1495.142674][ T840] FS-Cache: N-cookie d=00000000c744bfc3 n=000000008daee5b2 [ 1495.149877][ T840] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2800]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:56 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032211c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:56 executing program 4: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xffffffffffffffbe, 0xfffffffffffffff8) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x200000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 00:37:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2900]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1495.412235][ T926] FS-Cache: Duplicate cookie detected [ 1495.418003][ T926] FS-Cache: O-cookie c=000000001d36bf50 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1495.427198][ T926] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000049406898 [ 1495.434681][ T926] FS-Cache: O-key=[10] '0200020000807f000008' [ 1495.441072][ T926] FS-Cache: N-cookie c=0000000015bc3cc3 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1495.450010][ T926] FS-Cache: N-cookie d=00000000c744bfc3 n=000000007e6726fe 00:37:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2b00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1495.457373][ T926] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1495.483546][ T914] FS-Cache: Duplicate cookie detected [ 1495.489089][ T914] FS-Cache: O-cookie c=000000001d36bf50 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1495.498007][ T914] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000049406898 [ 1495.505242][ T914] FS-Cache: O-key=[10] '0200020000807f000008' [ 1495.511348][ T914] FS-Cache: N-cookie c=0000000060e403b7 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1495.520094][ T914] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000075dca49a [ 1495.527323][ T914] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 00:37:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x2f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 00:37:57 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) execve(0x0, &(0x7f0000000680)=[&(0x7f0000000380)='eth0bdev\x00', &(0x7f00000003c0)='&*\x00', &(0x7f0000000480)='$.:vmnet1\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='em1-\x00', &(0x7f0000000580)='fuse\x00', &(0x7f0000000640)='\x00'], &(0x7f0000000840)=[&(0x7f00000006c0)='@vmnet0procvmnet1ppp0selinuxeth1vmnet1\x00', &(0x7f0000000700)='asymmetric\x00', &(0x7f0000000780)='nfs\x00']) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000800)=[r2, r1]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000880)=ANY=[@ANYBLOB="583f4ae43f3fde786d9ad3673b76149e"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0xfffffffffffffffe}, 0xfffffffffffffd34) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) [ 1495.838889][ T956] FS-Cache: Duplicate cookie detected [ 1495.844593][ T956] FS-Cache: O-cookie c=000000001d36bf50 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1495.844605][ T956] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000049406898 [ 1495.844611][ T956] FS-Cache: O-key=[10] '0200020000807f000008' [ 1495.844656][ T956] FS-Cache: N-cookie c=00000000b66ef44d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1495.844665][ T956] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000b0a6fd86 [ 1495.844671][ T956] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:57 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032288c0010000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 00:37:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:57 executing program 4: socket$inet6(0xa, 0x3, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000040)=0x78) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r2 = msgget$private(0x0, 0x102) msgrcv(r2, &(0x7f00000002c0)={0x0, ""/45}, 0x35, 0x1, 0x800) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:57 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x300000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) 00:37:57 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032200c0020000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3580]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) [ 1496.639730][ T1007] FS-Cache: Duplicate cookie detected [ 1496.645302][ T1007] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1496.654149][ T1007] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000066d4666a [ 1496.661446][ T1007] FS-Cache: O-key=[10] '0200020000807f000008' [ 1496.667581][ T1007] FS-Cache: N-cookie c=00000000b68040ad [p=00000000a8002570 fl=2 nc=0 na=1] [ 1496.676288][ T1007] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000835be9a7 [ 1496.683524][ T1007] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3a00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1496.701446][ T981] FS-Cache: Duplicate cookie detected [ 1496.707068][ T981] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1496.715961][ T981] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000066d4666a [ 1496.723162][ T981] FS-Cache: O-key=[10] '0200020000807f000008' [ 1496.729321][ T981] FS-Cache: N-cookie c=0000000093627363 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1496.738037][ T981] FS-Cache: N-cookie d=00000000c744bfc3 n=000000002a44a167 [ 1496.745317][ T981] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, 0x0) 00:37:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x6558, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x40000000000005, [0x10, 0x57]}) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$P9_RWSTAT(r2, &(0x7f0000000100)={0xfffffffffffffcaa, 0x7f, 0x2}, 0x3) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x8a, "04ee6ee3d2cac6f9ecfeff99cd4905973ed23ef94c2c612e49db8629af393b7a8d2b20dbee67e22fecaf11572dd5decd0e02eb259849af9b4fbd2545c511b648b25419aee14c898bb7ecfce571e118959cfa21815af328cd75c80375b7f5dbfef0ac7dd5bce504dfdbbb75cce2f8a4dc142f2f0a33c64be96daf9e0c7e2d99133d0b520476b10aca3150"}, &(0x7f0000000040)=0x92) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x3da2, 0x4, 0x8000, 0xffff, r3}, &(0x7f0000000180)=0x10) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000500)=""/179, 0xb3) 00:37:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032200c0030000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3b00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:58 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x400000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) [ 1497.038192][ T1062] FS-Cache: Duplicate cookie detected [ 1497.043691][ T1062] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1497.053864][ T1062] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000066d4666a [ 1497.061238][ T1062] FS-Cache: O-key=[10] '0200020000807f000008' [ 1497.067634][ T1062] FS-Cache: N-cookie c=00000000706ac522 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1497.076401][ T1062] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000228a582a [ 1497.083875][ T1062] FS-Cache: N-key=[10] '0200020000807f000008' [ 1497.090400][ T1063] FS-Cache: Duplicate cookie detected [ 1497.096491][ T1063] FS-Cache: O-cookie c=0000000060add660 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1497.106225][ T1063] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000066d4666a [ 1497.113584][ T1063] FS-Cache: O-key=[10] '0200020000807f000008' [ 1497.120561][ T1063] FS-Cache: N-cookie c=0000000054d3d5d3 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1497.129317][ T1063] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000c2045d71 [ 1497.137160][ T1063] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:58 executing program 4: socket$inet6(0xa, 0x3, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000040)=0x78) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) r2 = msgget$private(0x0, 0x102) msgrcv(r2, &(0x7f00000002c0)={0x0, ""/45}, 0x35, 0x1, 0x800) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[@ANYBLOB]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x3f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032200c0040000f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x3f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:58 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0xfffffffffffffee1, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0, r1) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f00000000c0)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000300)={0x0, 0x4, 0x2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x80, 0x22200) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="a6be8ce852dc01736d18c4f6b22de52aa279ca3b0c113055d646817df98e35a5bb592c8c864be600d69379a2cb0545e7d9005dd460b088dd435c94dc66"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) syz_mount_image$f2fs(&(0x7f0000000340)='f2fs\x00', &(0x7f0000000380)='./file0\x00', 0x1000, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000ac0)="12eee82d66172a4c9fafc511ecd5c8f6aaa894bb85ad40b2652f9af353b9abe766e9288f92f9e1cc1b2062ecd18756fda602af88885738b215ac97dae62a5a5b61927f77131233a8c0402c15ee6726c29145b6d9ad47f86c61efc4f4c24af9021497a0483f0eedbc89ba07fd80bceb7459c0a759b7e847377714326cf06393fec8104f00d94af6e895408d32bf2773ea85fcc143f8d961d67ce37ecb237fb11c4330360a3ba513460ff1f8b1ec1b8af76b58bda0e96902df486cf6fd4f070dd3b27dac9a04619d1d41844f4754395fad7006f26e929d916bfed44979ae9800064410d4f343c808f47541c4a2832c6f344e01a04ef8baeb98e3e010107be92ff6bb87353fd9a3d1773c05abd00b0be010145797d43f67621bf961ad64f6af9ff2758f77d344c53abf5cb95f4aa290381de232edc73466b4c0212134f44566e5afabc3bcb96f11ec745af8256700ecedd545b6eec3e260943eec8304ea9c6fac603495e5a0251b84dae30c5a76466842319996ff2577271b281138be35ad91d9314d8ba5d534e7ea586ddb14be7ec61a67aa568ccd0b3d1cc5819fe64cbfa87950ebf96ada07ef8b8ebba685f8965e8cc34c99067c8cb89ea17cb5ad52dd78a1d6dd6b2f51198c3507252f45f75b2368bd5b90c097ce022e2b20f10938a46916c61db3eef269fd867483be5e236427bebad50c4e0f1c31944a7bbc1fd58e8bed9dcf1a0eaff6f02a6f8f774830b19dc179a0cee4a33992efadca420641523c9a7efe964099c39afa77a31912ca3e915ec08e51c8e48a067dd32b92b0c7df1ee6029d25df90f9fb17cac4ac1f74870a69c37aafdb6ae854100ba5456db3db06db00c32de354da0dac33edb295f0bf64665609c8506a4e66cdea097dffad2ff250a91bc125921f59f4364974248fbd048f7f33fd142e2c6d99000405b5fbe9d8217bf929cd9fdf3ee6dc05adb5d5b3e56b0b95a2d21821ff5cec7e809b48428f61a15bede1458b7975285c84b32d0ec9ecfb9684c4e63961c3ac1b589c365bef2230ceaa909ae1c5eac46bae24c85f17549cc3def7e6cbcad40257018981a3164302ea0b1789b43078a43c746d0bf1198258f68cbaf819f8d072db85759738be7073f64d68e804d7af31321a8a5a7bb2e90a84f104d2365406f94cec92c0633e97a3d163440cad93faf315ef3434f34e5335033e73d74be493faabd4bd9b5eb601254ab0eeb40ebacb4c11501579bfbc17f0575a0222bc3d29a6959b168ba05f56dbe5809c9530882529a469c8a23e680f32dc09895af8d41915577e696af6a2b33a43f0b6843f19e1f4f82a6db5e7d7ae6731e7edb000737dd2600a98514560459fa17b43f833a6d93ff8d8f7e2b085c1fa375b12596ca6a287611ab960bfe8fa3a863c5af9ce24b9318730171afc7556cc875a789cd8fd8a6b6352fae371d96740952db8fed6575990a9ddfa20e030d98f9bf088a34153d1f559e9c64b8493ef60c325ddd4844e00f6a2217dd0bba07bcc04b7e537eb3203d0223b522fc4917806be72e46ed0bdc98ab7aa10f7e821f86caf1f72613d42dd76af34c5c3bfe0ec224f12ed6ac876542372f3056e39202fa2f32e542847fe67968e179168b5593a168697f3c5bdb6b4ccbfa765541dfe20e52dae65269bad5c51bc5430a7c1256bac58bb9a8255109eddc176f3f0745f662eea1e5b9fd84f24873966dd48bcc3d87295153cc7bdada76a84f5fa58b6abb74f67f1e5915e0191e3bdf88626d4012fddbc5ded32b261dcebfb85aa76644e682e379a6a87666824bd373d2b00f31ef050f654fa57dbbeda90191828aec9dce5fde26846dafe3243d81145253cb041d1357c7d36131db67b2d790c17d515718e86e5880c173548fb1c4e3e57d8bfddd049779452c6fcd5f66e7e4704b246182d3ce5b559af38a4c0208b412cb40d2b23e278c6a82791b6e619ea1d40b6dc4239e3af0a0b076298e930a9e78b3d2daa9426f05b175800f72f9ab019710c1b9e64bf088b6a2a1ac4af01b95268c893b4a2f14871ba12ba95a17141f08924f6145b6febcc93e567e90a4ab27e1151a77684b0dfd9d26959a39b36d74fdf9d05d3b32fcc9738f904e6533c059b819ab70d869dd00387161a842b364c859bc58fe4340ce645b8e606cc76346964f0a0191889ab1eee1eaaa0485c1de7a4f212d8a2862138e305fbcb58913a9ab16a6d0e0f7b867826617a81d8723cb00827d6c2723c08908fd6a3b9bf3edc48326cd7be0fab14c24081da3bef7a824c6559544d16aa58a4ef312ac487415ac1782b758cae58c36a9eb4300692356afd86610ce4e6babfd3006aea7a62ab4003b169c449cca3fc098cde8f55628e8b5126b747dea97698ded593028b03c752d50249369e94a52332ecf93be8e34e66acca4950e98c215111bbd3f854970b51a506b44905e336aa81d8365b5cbb0c7d3eb7ed4a71d71878df33021a67c13a2a4d69b894f640ea3ac7c05cf5afb9b313e46aef9e99d7f2b34b352a22c476d6e78b7c2d5ceafb918cc880c70df6a5a938aa5d5565007f4674c9798df6f9c5cf9683c5edaed6b0141b3774abc2a872c2163094092118c55ee2785eb7c07b13bb2f35372ffcd7f24ff8667dc1890496ab3962f2a9d125263ee3af2cc7e84260acb1c077664d733d66a0ac9f460ce99e175a73e926f45171ab3b2cb078b2634a6a46af23c2124eb51b373c0a1487a1f690244d1a877e36d852898515a413d8507edccaa9ff7725aff3ed2d309b90d88272459adab58f4fccd08bd98c9c32dfa804daa7d97e567b0d6f9918bae264ae3bb1f66ee6bd908b3ec6e6b48cdf99f345ebb664c9f41af406fe08d3f78c0211975bea44bf76d3335afff2c532eb77ba5fbb6d654c3283533bc93b250547e4b765e717d814a12371456a7c585b662ff601ef5bb7bcaefcdb842f264d9ce3e79a95fba6e66262f2828ae0e0b26f6dafa9fcafc7b1b22fc02e9e622ee5ff74d144a74907b5d0fcbfe10cfe363d1e63c8557aca159e5393c2e9afd15cd1cdd667309f7d9455b28a3eeff95f9e83b19b11647ad9b10bde563404ccf724628d2bfa8bd5871b4ed6f985848abeacc612adce46dfd2d957b9f2458ee1ec14c907f0e00252d3ca4223fd4c8ecf0798dc5e5b601719dc33bdc54f413ea8903b298dbca2c41513026009e5623d36cc429a82a55cc7597bb4a7d8ab075c2f3bcf73921c35fb81d03ddc1c11d3c46b9edcdd67fa1706d8ea31ed8df51467d97e32dfbf6dd35a09c66837ae9d1c0f748ddaf7f8fd9c7cc2b68d1d8c5da606a8f0ec558eb6c2eb037e2d13a40720d3f3fd0f594fb64ba8d4c048109ef759326dc4a7a10f651d695c0f9332a051c8982152ad63102139481a8ed484e22de7ba7298c6b7052b5a6effb37572f3b893422f249bd65fc4d02dff36015a436060ef031497132e7443842690094615ff6efa63af7083194da60d4605bd527ed3d177d4832429889cb264f21935cb008b186bccc49c4191ef3340af049342a970718af46fb437226a44ff2f73501ce4baa0b3eae4bceba1401fed2f5bc225231b3418596d094dae0a4652577ec8cf2f56e1dfafb9c0e517a6f5867a5e9ae6db943682b758cb0d79f7d29a781e840ba21d44e1386457be7bf14d7c5fe36e41b605182a7e0da595d95cacd72db82573db1de9e4cc8ea5793527aa08d6b9e3f708bffc26d1fbd006e652c8e204be050786722ab4325f8ad98c861f7d25ca74e06523a404615d77b3abf4d89e303266e825059e2d25eff1221d35225b5e5b6a3221ef931872557137ba465f6628a61c64bd35e3eacfe3c60681de1d3f33ee42bb76d52d0d5d92946ff8eb924d574eba8d4f3db4de750ac1438d51f12d2f07b7885ec374c73d29966a18f920d2be445a46cce75f6aea93f365d234cebfd8e17f2e7318bf6dab0f464a179ccbf4754aaa991fa8a0bfd605341cfa7c51262531d682c174e5c3ccc383c7d5f7a9485a45a1bee4282205894f342969d90feb76abdc495be45bec71738de47a1eb6628f6144772618424ff7c0a8283a36240553e260fe1fe27a181f9c0138966b232cd91496ff09db8367c5aed93800fd58a0cd36ac93fc9bda0332653e494660e128438d01237e823318913b5470b048709b55bd50f345cc0c461e124580d8e02026da8c6e0e3a42c3871581afc1ee05ef342771b7bb5b166850ae7685d66c9e487a4ec721e20c3f6d4e600af6a4913133addc2cd29cba37f727763cc1c76fe7bff0e0a479aa40f106a4ebd8fff62ee9262009bf9f9da72cd7627f81a721da16b9f550e127942de213221c1b925f97beaa11f9329d286df1207442fb2ebcb8ade1433f5bfcd70dd9e0b188680514b70837594ced874a2f55b317753d875794aed83e5fc7c8c004fc9746d02e5f2f25990be5bd528767935b309bbc000e563280897c841bb18f5500c129d2e08118df8cf19e8b74fb72943f5d3ac091bc522fd298d0bf51414eb0417d12688923b93a93dd400cb2ceb82896acb12636d02dcd5c209e547b312b102eb1d8d4c38c7aa882e8f7e0bd8476ce37699582e6879514b6e8f4f32c783e2e85cb9bb03950125c8b1c6d45c3a88606b143cfabd8bea19969d063df4314f8a259641d16675edffc92431d4b4ad79b9ad40a78fa5d10b93c8e4f4ec726235cd28a17a64646882800f855ede4929d9e6a5af070b4b18b8b4b290b0160b3c0ec6521cf967f043ebb0ea9da104af6e35b9b82a11eda1ed21d0dd7dbf69da73454328ec09daa68a35a8c626db11fdff53cd9c3694355167876cbf08e812f68eca710341a07a0f11c08d284a6afad5b9e73043ac38ded55a8571088d44be42c32e09bb645e78af4ba252c3ebe0e7c9b9b9d330c2eee85f56e9ed7f1f66da25029f5d06ae6a372ce5f0a64f1627380b579500d8b47d175d5fc22e5cbafc10b77bd8d52529e2e445b1e88936c57b52a9fbf75d90889fd00ef8297723db45ffa47e6260839cad40aff486fea0a0526212f365ac5ae9f832f5ce737bf1cb91daaba5911dd5d5b1ffaa91ffebf2cc276c07ee27e733bdbc61dcc1cf4c74873a4b40575aaddd8a9507baa561cbc7fd7e82d32507b235d4846d240cbaea3cd9abab5c4a0244da1268df6da14010634f8e4b53d44db8009f13f1f518a7e704558be934774221eece6865ee7761034750288b4cc90599930a85d02cfaed4b6b3c7e60aa932ab4de5eb4cf6f26a5f6048e121396b7661364ecdba24114c4fd3057d1ed5455ba099ca53fe1de5249338e3d6b3c02ab7bd500105a2a38025928bee6de78f3245ce51cfb41ab1f7eedbafd76a3a3607ea51ccb08d5ebf00ae4e5a2b3d16066cee70b7561bf18724a9bd2a507ec111c9ff0ebdb5eaf00bdb2d15cb0aa85aa1535a478976877446bbd78fbaa81499db2e31274846f3de05823f33b5a721b5a338bc10043fd68bff6dde7880e3b6b8675d8c7c5c20a75529394cef868de3b62b422bf2d4887a5fad3120c840e6ebe5058c603af9571a20ea0794518f5583bf0bd999176698b03885a77a8a76c6323c5031e5de7d0e5c9a37ea73c2394077623c74b9f67a69c62861418bbc7e90c412dcee05cd2eee03c66bc80f78373c3e7fc86dbfa9f0f6eb7822c86bd8b241b69cfdcb813463030da815955bf084c765051cacd1c8f16b08a694c088f716329d1a422da64908155da16f594ffe6383224e6668e78508119717537a25da8d193ab9b1a209217de545a1e7f5c381ae20bd20123bbecf78a3585cbf6be692072e7d290f1aa368d2d147fc4942de", 0x1000, 0x5}], 0x102100a, &(0x7f0000000840)=ANY=[@ANYBLOB="686561702c696e6c696e0500646174612c70726a6a71756f74613d2f6465762f766964656f30002c757365725f78617474722c6e6f7265636f766572792c6261636b67726f756e645f67633d6f6e2c616c6c6f635f6d6f64653d72657573652c646f6e745f61707072616973652c657569643e", @ANYRESDEC=r3, @ANYBLOB=',appraise_type=imasig,defcontext=root,uid=', @ANYRESDEC=r3, @ANYBLOB=',subj_user=keyring\x00,dont_hash,appraise_type=imasig,smackfsroot=nfs\x00,\x00']) keyctl$get_persistent(0x16, r3, r1) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000480)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000500)={r5}) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:58 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032200c0000300f0000000f0000000f000000000000000b8020000b8"], 0x1) 00:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1497.484402][ T1092] FS-Cache: Duplicate cookie detected [ 1497.489933][ T1092] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1497.498834][ T1092] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000053af82cf [ 1497.506075][ T1092] FS-Cache: O-key=[10] '0200020000807f000008' [ 1497.512186][ T1092] FS-Cache: N-cookie c=000000008bdaec72 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1497.520925][ T1092] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003f4db1f7 [ 1497.528160][ T1092] FS-Cache: N-key=[10] '0200020000807f000008' [ 1497.825192][ T1058] FS-Cache: Duplicate cookie detected [ 1497.830609][ T1058] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1497.839985][ T1058] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000053af82cf [ 1497.847206][ T1058] FS-Cache: O-key=[10] '0200020000807f000008' [ 1497.853309][ T1058] FS-Cache: N-cookie c=0000000084618602 [p=00000000a8002570 fl=2 nc=0 na=1] [ 1497.862032][ T1058] FS-Cache: N-cookie d=00000000c744bfc3 n=00000000671fc61c [ 1497.869254][ T1058] FS-Cache: N-key=[10] '0200020000807f000008' [ 1497.882429][ T1056] FS-Cache: Duplicate cookie detected [ 1497.888047][ T1056] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1497.896952][ T1056] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000053af82cf [ 1497.904137][ T1056] FS-Cache: O-key=[10] '0200020000807f000008' [ 1497.910293][ T1056] FS-Cache: N-cookie c=000000005321e56d [p=00000000a8002570 fl=2 nc=0 na=1] [ 1497.918982][ T1056] FS-Cache: N-cookie d=00000000c744bfc3 n=0000000012c49ff2 [ 1497.926208][ T1056] FS-Cache: N-key=[10] '0200020000807f000008' 00:37:59 executing program 0: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x2, &(0x7f0000000800)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000040)=ANY=[@ANYBLOB="d31183dff300"]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0xffffffffffffffff, 0x7fe, 0x7fffffff, 0x5}) 00:37:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x2b) connect$inet6(r1, &(0x7f0000000000), 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x4305]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:37:59 executing program 5: socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000740)='keyring\x00', 0x0, 0x0, 0x0, r0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000680)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x500000000000000, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000800)) mount$fuse(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x810000, &(0x7f0000000840)=ANY=[]) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/98) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) get_thread_area(&(0x7f00000004c0)={0x101, 0xffffffffffffffff, 0xfffffffffffffffd, 0xc000000000000000, 0x8, 0xf73acf, 0x0, 0x0, 0x7fffffff, 0x5}) 00:37:59 executing program 1: clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400001150032200c0010200f0000000f0000000f000000000000000b8020000b8"], 0x1) [ 1497.984385][ C0] ------------[ cut here ]------------ [ 1497.990292][ C0] ODEBUG: free active (active state 0) object type: timer_list hint: xprt_init_autodisconnect+0x0/0x220 [ 1498.001654][ C0] WARNING: CPU: 0 PID: 21857 at lib/debugobjects.c:325 debug_print_object+0x16a/0x250 [ 1498.011204][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 1498.017797][ C0] CPU: 0 PID: 21857 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1498.026817][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.036959][ C0] Call Trace: [ 1498.040236][ C0] [ 1498.043104][ C0] dump_stack+0x1db/0x2d0 [ 1498.047447][ C0] ? dump_stack_print_info.cold+0x20/0x20 [ 1498.053184][ C0] ? debug_print_object+0x150/0x250 [ 1498.058387][ C0] panic+0x2cb/0x65c [ 1498.062291][ C0] ? add_taint.cold+0x16/0x16 [ 1498.066978][ C0] ? debug_print_object+0x16a/0x250 [ 1498.072179][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.078415][ C0] ? __probe_kernel_read+0x1f4/0x250 [ 1498.083699][ C0] ? __warn.cold+0x5/0x48 [ 1498.086999][ T1125] FS-Cache: Duplicate cookie detected [ 1498.088030][ C0] ? __warn+0xe8/0x1d0 [ 1498.088059][ C0] ? debug_print_object+0x16a/0x250 [ 1498.093425][ T1125] FS-Cache: O-cookie c=0000000054691959 [p=00000000a8002570 fl=222 nc=0 na=1] [ 1498.097464][ C0] __warn.cold+0x20/0x48 [ 1498.097480][ C0] ? debug_print_object+0x16a/0x250 [ 1498.097497][ C0] report_bug+0x263/0x2b0 [ 1498.097517][ C0] do_error_trap+0x11b/0x200 [ 1498.102700][ T1125] FS-Cache: O-cookie d=00000000c744bfc3 n=0000000053af82cf [ 1498.111523][ C0] do_invalid_op+0x37/0x50 [ 1498.111537][ C0] ? debug_print_object+0x16a/0x250 [ 1498.111559][ C0] invalid_op+0x14/0x20 [ 1498.115792][ T1125] FS-Cache: O-key=[10] '0200020000807f000008' [ 1498.120961][ C0] RIP: 0010:debug_print_object+0x16a/0x250 [ 1498.125281][ T1125] FS-Cache: N-cookie c=00000000281e651a [p=00000000a8002570 fl=2 nc=0 na=1] [ 1498.129827][ C0] Code: dd e0 18 82 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd e0 18 82 88 48 c7 c7 80 0e 82 88 e8 56 a2 b8 fd <0f> 0b 83 05 31 b4 c9 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1498.137023][ T1125] FS-Cache: N-cookie d=00000000c744bfc3 n=000000003dad3246 [ 1498.141375][ C0] RSP: 0018:ffff8880ae6079d0 EFLAGS: 00010082 [ 1498.146573][ T1125] FS-Cache: N-key=[10] '0200020000807f000008' [ 1498.150676][ C0] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1498.150688][ C0] RDX: 0000000000000100 RSI: ffffffff81688856 RDI: 0000000000000005 [ 1498.163203][ T1124] IPVS: ftp: loaded support on port[0] = 21 [ 1498.171466][ C0] RBP: ffff8880ae607a10 R08: ffff88809b61e600 R09: ffffed1015cc3ef9 [ 1498.171474][ C0] R10: ffffed1015cc3ef8 R11: ffff8880ae61f7c7 R12: 0000000000000001 [ 1498.171482][ C0] R13: ffffffff899ae240 R14: ffffffff816ed850 R15: ffff88809b7c6b60 [ 1498.171501][ C0] ? __internal_add_timer+0x2f0/0x2f0 [ 1498.171523][ C0] ? vprintk_func+0x86/0x189 [ 1498.196076][ T1124] kobject: 'lo' (00000000533e59b2): kobject_add_internal: parent: 'net', set: 'devices' [ 1498.198289][ C0] debug_check_no_obj_freed+0x3ac/0x5a7 [ 1498.205299][ T1124] kobject: 'lo' (00000000533e59b2): kobject_uevent_env [ 1498.210397][ C0] ? free_obj_work+0x890/0x890 [ 1498.218727][ T1124] kobject: 'lo' (00000000533e59b2): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1498.226309][ C0] kfree+0xbd/0x230 [ 1498.226328][ C0] rcu_core+0xd76/0x1680 [ 1498.226351][ C0] ? rcu_fwd_progress_check+0xd0/0xd0 [ 1498.232831][ T1124] kobject: 'queues' (00000000249b65ca): kobject_add_internal: parent: 'lo', set: '' [ 1498.240165][ C0] ? clockevents_program_event+0x15f/0x380 [ 1498.240185][ C0] ? pvclock_read_flags+0x160/0x160 [ 1498.240203][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.252620][ T1124] kobject: 'queues' (00000000249b65ca): kobject_uevent_env [ 1498.256101][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.256119][ C0] ? check_preemption_disabled+0x48/0x290 [ 1498.256142][ C0] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 1498.256155][ C0] ? rcu_pm_notify+0xd0/0xd0 [ 1498.256180][ C0] __do_softirq+0x30b/0xb11 [ 1498.261965][ T1124] kobject: 'queues' (00000000249b65ca): kobject_uevent_env: filter function caused the event to drop! [ 1498.266100][ C0] ? __irqentry_text_end+0x1f96d2/0x1f96d2 [ 1498.266123][ C0] ? kvm_clock_read+0x18/0x30 [ 1498.266137][ C0] ? kvm_sched_clock_read+0x9/0x20 [ 1498.266155][ C0] ? sched_clock+0x2e/0x50 [ 1498.276282][ T1124] kobject: 'rx-0' (000000003380e062): kobject_add_internal: parent: 'queues', set: 'queues' [ 1498.281365][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.281378][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.281395][ C0] ? check_preemption_disabled+0x48/0x290 [ 1498.281419][ C0] irq_exit+0x180/0x1d0 [ 1498.288647][ T1124] kobject: 'rx-0' (000000003380e062): kobject_uevent_env [ 1498.292977][ C0] smp_apic_timer_interrupt+0x1b7/0x760 [ 1498.292993][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1498.293006][ C0] ? smp_call_function_single_interrupt+0x640/0x640 [ 1498.293024][ C0] ? trace_hardirqs_off+0x310/0x310 [ 1498.302825][ T1124] kobject: 'rx-0' (000000003380e062): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1498.306233][ C0] ? task_prio+0x50/0x50 [ 1498.306249][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.306266][ C0] ? check_preemption_disabled+0x48/0x290 [ 1498.306286][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1498.306307][ C0] apic_timer_interrupt+0xf/0x20 [ 1498.311081][ T1124] kobject: 'tx-0' (00000000420c58a2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1498.315863][ C0] [ 1498.315880][ C0] RIP: 0010:lock_is_held_type+0x18a/0x210 [ 1498.315896][ C0] Code: 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 75 63 48 83 3d d9 ee 2e 08 00 74 30 48 89 df 57 9d 0f 1f 44 00 00 48 83 c4 08 44 89 e0 <5b> 41 5c 41 5d 5d c3 48 83 c4 08 41 bc 01 00 00 00 5b 44 89 e0 41 [ 1498.315904][ C0] RSP: 0018:ffff8880895d7718 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 1498.315917][ C0] RAX: 0000000000000000 RBX: 0000000000000286 RCX: 1ffffffff14b8e27 [ 1498.315925][ C0] RDX: dffffc0000000000 RSI: 00000000ffffffff RDI: 0000000000000286 [ 1498.315938][ C0] RBP: ffff8880895d7730 R08: ffff88809b61e600 R09: 0000000000000001 [ 1498.326404][ T1124] kobject: 'tx-0' (00000000420c58a2): kobject_uevent_env [ 1498.331578][ C0] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 1498.331587][ C0] R13: ffff88809b61e600 R14: 00000000000001a1 R15: 00000000006080c0 [ 1498.331622][ C0] ___might_sleep+0x285/0x310 [ 1498.331639][ C0] ? arch_local_save_flags+0x50/0x50 [ 1498.337218][ T1124] kobject: 'tx-0' (00000000420c58a2): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1498.343029][ C0] ? textify_hooks.constprop.0+0x1a0/0x1a0 [ 1498.343057][ C0] ? save_stack+0x45/0xd0 [ 1498.343078][ C0] ? kvfree+0x61/0x70 [ 1498.351939][ T1124] kobject: 'tunl0' (00000000d61f95a8): kobject_add_internal: parent: 'net', set: 'devices' [ 1498.356465][ C0] __might_sleep+0x95/0x190 [ 1498.356487][ C0] kmem_cache_alloc_node_trace+0x266/0x720 [ 1498.356506][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.356529][ C0] __get_vm_area_node+0x12b/0x3a0 [ 1498.363513][ T1124] kobject: 'tunl0' (00000000d61f95a8): kobject_uevent_env [ 1498.368446][ C0] __vmalloc_node_range+0x191/0x910 [ 1498.368463][ C0] ? xt_counters_alloc+0x50/0x70 [ 1498.368479][ C0] ? ipt_do_table+0x1c10/0x1c10 [ 1498.368496][ C0] ? xt_counters_alloc+0x50/0x70 [ 1498.374067][ T1124] kobject: 'tunl0' (00000000d61f95a8): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1498.377559][ C0] ? vfree_atomic+0xe0/0xe0 [ 1498.377579][ C0] ? kvfree+0x61/0x70 [ 1498.377595][ C0] ? xt_counters_alloc+0x50/0x70 [ 1498.377611][ C0] vzalloc+0x6b/0x90 [ 1498.377629][ C0] ? xt_counters_alloc+0x50/0x70 [ 1498.388975][ T1124] kobject: 'queues' (0000000006f4aee4): kobject_add_internal: parent: 'tunl0', set: '' [ 1498.394311][ C0] xt_counters_alloc+0x50/0x70 [ 1498.394328][ C0] __do_replace+0xbb/0xa80 [ 1498.394353][ C0] ? compat_table_info+0x4c0/0x4c0 [ 1498.394368][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1498.394388][ C0] ? _copy_from_user+0xdd/0x150 [ 1498.399506][ T1124] kobject: 'queues' (0000000006f4aee4): kobject_uevent_env [ 1498.404150][ C0] do_ipt_set_ctl+0x4a9/0x653 [ 1498.404169][ C0] ? compat_do_ipt_set_ctl+0x160/0x160 [ 1498.404196][ C0] ? mutex_unlock+0xd/0x10 [ 1498.408948][ T1124] kobject: 'queues' (0000000006f4aee4): kobject_uevent_env: filter function caused the event to drop! [ 1498.418634][ C0] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 1498.418654][ C0] nf_setsockopt+0x7d/0xd0 [ 1498.418673][ C0] ip_setsockopt+0xdf/0x100 [ 1498.418689][ C0] tcp_setsockopt+0x95/0xf0 [ 1498.418710][ C0] sock_common_setsockopt+0x9a/0xe0 [ 1498.425279][ T1124] kobject: 'rx-0' (00000000b4a2fe49): kobject_add_internal: parent: 'queues', set: 'queues' [ 1498.431160][ C0] __sys_setsockopt+0x1b0/0x3a0 [ 1498.431177][ C0] ? kernel_accept+0x310/0x310 [ 1498.431196][ C0] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1498.437269][ T1124] kobject: 'rx-0' (00000000b4a2fe49): kobject_uevent_env [ 1498.441022][ C0] ? trace_hardirqs_on+0xbd/0x310 [ 1498.441053][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.441071][ C0] ? trace_hardirqs_off_caller+0x300/0x300 [ 1498.448408][ T1124] kobject: 'rx-0' (00000000b4a2fe49): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1498.453595][ C0] __x64_sys_setsockopt+0xbe/0x150 [ 1498.453615][ C0] do_syscall_64+0x1a3/0x800 [ 1498.453633][ C0] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1498.459571][ T1124] kobject: 'tx-0' (00000000fd4332b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1498.465716][ C0] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1498.465736][ C0] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1498.465761][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.465776][ C0] RIP: 0033:0x45abea [ 1498.471430][ T1124] kobject: 'tx-0' (00000000fd4332b5): kobject_uevent_env [ 1498.481686][ C0] Code: 49 89 ca b8 37 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ea 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1498.481694][ C0] RSP: 002b:00007ffdbb613358 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 1498.481708][ C0] RAX: ffffffffffffffda RBX: 00007ffdbb613380 RCX: 000000000045abea [ 1498.481717][ C0] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 1498.481725][ C0] RBP: 000000000070fe80 R08: 00000000000002d8 R09: 0000000000004000 [ 1498.481733][ C0] R10: 000000000070dd20 R11: 0000000000000202 R12: 0000000000000003 [ 1498.481740][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000070dcc0 [ 1498.487075][ C0] Kernel Offset: disabled [ 1499.004499][ C0] Rebooting in 86400 seconds..