007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xe}, 0x0) 11:49:13 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0xa07b2531150452fc, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0xa0}, 0xa0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) write$binfmt_script(r4, &(0x7f0000000600)={'#! ', './file0', [{0x20, '9p\x00'}], 0xa, "c81255c8dda777e8ad1e026fa549d4e9007ba9bf58423851bdcee604efeb2ba49fd8e20c6e27b85273686fd235beab74c67de8cbd321a1c306366316c608d7e7c87ef7ee6675b66effac7cc8f73a892ecc7b2ff463430d46f9f67fccfc42f71dc1b4258915a64b6689879df5ecb9e38b3a846453640d9a45d145b6feb63ee6d4a7b8cf383b259fd7b7fadb95b1bdd056a956ef97c5e89ab500d7e9cdf7988f6bd97e23fa39bff811bc1407bf2215b2078284974810e4d7fb548e6e9f9b772053e256869e753cc91417d97c5d769be3b38cf555ab18d5aba27affc50bb10d7055eb4ac965bdd22ce546ad6debbf5e"}, 0xfd) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000180)) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 600.405562][T22626] BPF:[2] Invalid kind:0 11:49:13 executing program 0: r0 = socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ec"], 0x13}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492747, 0x0) 11:49:13 executing program 2: socket$inet6(0xa, 0x80003, 0x80) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:13 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0), 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 600.577209][T22638] BPF:[2] Invalid kind:0 11:49:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf}, 0x0) 11:49:13 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) [ 600.775058][T22649] BPF:[2] Invalid kind:0 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:14 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0), 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x4, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x10) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000400)={0xa0}, 0xa0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000240)={0x0, 0x1c, [0xe7, 0x9, 0x5c29, 0x48fbf4be, 0x8, 0x6, 0x71]}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x18) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) ioctl$FICLONE(r3, 0x40049409, r0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d92468ada25f3825b9fdcc7e68a280ca415220e87ed849cec6f829436f4cc0d3b7c0163a92e8f39d5469ed2028742d29a53230000010000000000d72d8e74ea3ad8766ad73e573f8d359c", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x60}, 0x0) [ 600.939800][T22659] BPF:[2] Invalid kind:0 11:49:14 executing program 0: socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492747, 0x0) 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:14 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0), 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:14 executing program 0: socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492747, 0x0) 11:49:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x4, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 601.223659][T22675] BPF:[2] Invalid kind:0 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf0}, 0x0) 11:49:14 executing program 0: socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492747, 0x0) [ 601.415852][T22693] 9pnet: Insufficient options for proto=fd [ 601.417872][T22688] BPF:[2] Invalid kind:0 11:49:14 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x4, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 601.468582][T22696] 9pnet: Insufficient options for proto=fd 11:49:14 executing program 0: r0 = socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 11:49:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7f, 0x7f, 0x3, [@int={0x2, 0x0, 0x0, 0x1, 0x0, 0x74, 0x0, 0x36, 0x2}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x101, [{0x5, 0x5, 0x2}, {0xd, 0x4, 0xb16a}, {0x4, 0x2, 0x50002210}]}, @datasec={0xc, 0x3, 0x0, 0xf, 0x3, [{0x4, 0x200, 0xfffffffe}, {0x3, 0x7f, 0xaf33}, {0x5, 0x891, 0x1ff}], "3198fc"}, @typedef={0xd, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x30]}}, &(0x7f0000000600)=""/248, 0x9b, 0xf8, 0x1}, 0x20) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:14 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x300}, 0x0) [ 601.652305][T22707] BPF:[2] Invalid kind:0 11:49:14 executing program 0: r0 = socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0xfffffffffffffffe, 0x0, 0xffff}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:15 executing program 0: r0 = socket(0x10, 0x80002, 0x100000000000000c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000060117020000000000000e151d96ecff"], 0x14}}, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) [ 601.836074][T22721] BPF:[2] Invalid kind:0 11:49:15 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x3f6}, 0x0) 11:49:15 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) epoll_create(0x0) [ 602.032178][T22733] BPF:[2] Invalid kind:0 11:49:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:15 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 602.180647][T22743] BPF:[2] Invalid kind:0 11:49:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xa00}, 0x0) 11:49:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$smack_xattr_label(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000140)={'9p\x00'}, 0x4, 0x1) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x129) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r6 = accept4$inet(r5, &(0x7f0000000840)={0x2, 0x0, @dev}, &(0x7f0000000880)=0x10, 0x800) setsockopt$inet_opts(r6, 0x0, 0x1b, &(0x7f00000008c0)="8550b193e38a934961ac56551b21c44d5b2677a0ba02288ed30dbe4671b55dee306855177b997d13168a73dfda96b8f1535eb9229d0f131a8335f6f13fee77", 0x3f) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000740)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) fstat(r9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r4, &(0x7f0000000340)={0xa0, 0x19, 0x2, {0x220, {0x20, 0x1, 0x2}, 0x3, r8, r10, 0x7, 0x4, 0x3, 0x8, 0x9, 0x5, 0x80000001, 0x0, 0x0, 0xb1, 0x7, 0x1000, 0x1, 0x7f, 0x40}}, 0xa0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'irlan0\x00'}, 0x18) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x400) 11:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:15 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 602.441279][T22763] BPF:[2] Invalid kind:0 11:49:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xe00}, 0x0) 11:49:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x2, 0x3, 0x0, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "e0"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x60}}, 0x0) [ 602.656579][T22772] BPF:[2] Invalid kind:0 11:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:15 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:15 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf00}, 0x0) 11:49:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00\x94u\xb7\xfbr\xf3\xf0\xaae\x8d\xa1\xa9%\x00\xb2\x1b\xb3o\xcbe\xa7\x8c\xd6\x1e\xc7p\x86\x8fG\xc1\xf8\xc6\xe5=+o\xac\xc3\xf0N\xca\xa5Zm\xc6\xa0\x110\xd2q\x98\xc5\xc3\xaa\x89\xc1\xce\xde\xf1\vp\xderD\xc6\xa2\xc2\xc3\xfc\xc7\x87\xf0O\xb8a\xd8\xef@uu\x1d\xef\xf7\x17@\x17\xf1\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) pwrite64(r2, &(0x7f00000003c0)='6', 0x100000172, 0x83da) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) mknod(&(0x7f0000000000)='\x00', 0xc000, 0x7f) fallocate(r1, 0x8, 0x0, 0x8000) [ 602.930209][T22793] BPF:[2] Invalid kind:0 11:49:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) r2 = msgget$private(0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, r4}}) r5 = msgget$private(0x0, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000340)={{0x0, r7}}) r8 = msgget$private(0x0, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r8, 0x1, &(0x7f0000000340)={{0x0, r10}}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESOCT=r2, @ANYPTR, @ANYPTR64=&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYPTR64], @ANYRES64=r5, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYBLOB="c9c6a2d05a832270e83871e268185ec4aaf7e067e5938b10741f9809434b0133d35631471551d83be3f0aa927781d18718705074fc54ceb1f8d743a32d9d07d48a2ce482a6acab3907311d8c14a0e64b", @ANYRES64, @ANYRESHEX=0x0], @ANYRESOCT=0x0, @ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="109e31f24326e5956647854e2378b8c94eea132e52b73d22faeeee5c592cce0016162effac5b91dda5252f3a3517376f0a4ccc033bee2e885dc42cd461bba1dff1c206a6fef62911b23634e9e9493da3fc55afbf1dc81ce56cd32765d8241a053a4e3ee0c3bbb5da430b0f031109973da6a07a90ea4cbe8caa3789a0790aeb042cb0239c9cc211011ea01af58126f95584fcf37ef6824b9b2168e3d4b9788d3cf56dc7330d9ca1997d8651acd24a9b3bfb89ef4289b0c7cf8944a815e44254f9cdad3534cc6c6f5496e13529a02d87255a18ba6072521643ca2081000ee88618b73682cece1e1a12d4261939135d41a3a2d380eb5941", @ANYRES32=0x0], @ANYBLOB="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", @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR], @ANYRES64=r10]]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) r11 = semget$private(0x0, 0x7, 0x0) semop(r11, &(0x7f0000000240)=[{0x0, 0x0, 0x1800}], 0x1) semctl$GETALL(r11, 0x0, 0xd, &(0x7f0000000600)=""/216) 11:49:16 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) creat(&(0x7f0000000000)='./bus\x00', 0x0) statfs(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)=""/21) [ 603.151162][T22811] BPF:[2] Invalid kind:0 11:49:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x4000}, 0x0) 11:49:16 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x10) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) munlockall() clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x16, 0x0, 0x4129}, {{r1, r2/1000+10000}, 0x12, 0x5, 0x10001}, {{0x0, 0x7530}, 0x0, 0x8, 0x383}, {{0x77359400}, 0x15, 0x3ff, 0x5}, {{r3, r4/1000+30000}, 0x17, 0x6, 0x1000}], 0x78) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) write$FUSE_BMAP(r7, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) [ 603.264084][ T27] audit: type=1326 audit(1575546556.418:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22815 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 11:49:16 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) prctl$PR_GET_CHILD_SUBREAPER(0x25) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 603.372703][T22825] BPF:[2] Invalid kind:0 11:49:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x6000}, 0x0) 11:49:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) getpeername$inet(r0, &(0x7f0000000280)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x22) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0xa0}, 0xa0) fcntl$setflags(r1, 0x2, 0x1) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3dd663f54f11d811f4b0a939470f00fb530ecea03048923865113163cd50a77f633c3c69eed38e53ccf67c2c02278dc96fa7b49cc9560c03e1f96f2f580dd490a3f3801084bf01a4240ebd", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:16 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 603.624257][T22845] BPF:[2] Invalid kind:0 [ 603.921921][T22857] 9pnet: Insufficient options for proto=fd [ 603.932078][T22859] 9pnet: Insufficient options for proto=fd [ 604.063894][ T27] audit: type=1326 audit(1575546557.218:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22815 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d4ba code=0xffff0000 11:49:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) tkill(r2, 0x1000000000016) 11:49:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf000}, 0x0) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:17 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) [ 604.184634][T22871] BPF:[2] Invalid kind:0 [ 604.261675][T22881] BPF:[2] Invalid kind:0 11:49:17 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(0x0, 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf603}, 0x0) 11:49:17 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 604.445655][T22891] BPF:[2] Invalid kind:0 11:49:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) fchdir(r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r4, 0x5441, 0xff) 11:49:17 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 11:49:17 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(0x0, 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x30000}, 0x0) [ 604.703226][T22911] BPF:[2] Invalid kind:0 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {0x0}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r1 = dup(r0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x8) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) r2 = socket(0x10, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffff, 0x28}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r5, &(0x7f0000000540)="3cc2be1b6ec4c274530a006d442c0ce74eead38d223a4b3606fc70c177aac4dfd0fa1278b3f023722d2342dc5394eec87a84bc461bb6eb7e6ce6ecb8448dbd829e8081368f865d3ab173ed785081a2ef00f58291e0bc7293509c6f6237fb3f9579ecf7433e0df6ea03904b38d0c6ff73ce476a52f267046bff41e9ef13c0e06ffae4bd1e087739c2e10a6d40579edb25796d39bf1ef51f398647a61ea5aceb4ed6d36f7f150828c2623cfbe84c2d165e101cc65ac7520d9e2ef83336247fcec65d992ba8614799fb5f1a53133b495f0cfb63f7", &(0x7f0000000640)="3b8491e1fe04f984c18a98fbdaac39874319cb8504142b8e0882231723de4ddec227e516ae6cd3aac18035eaf108ba783bef5e388dc78194ef52", 0x3}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_DISCARDURB(r4, 0x550b, &(0x7f0000000280)=0xdeb) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r6, 0x1, 0x6, @broadcast}, 0x10) r7 = socket$inet_sctp(0x2, 0xe47f31a6671beef3, 0x84) getsockopt$sock_timeval(r7, 0x1, 0x42, &(0x7f0000000380), &(0x7f00000003c0)=0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[]) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) prlimit64(0xffffffffffffffff, 0xe, &(0x7f00000002c0)={0x0, 0xc4}, &(0x7f0000000340)) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:18 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(0x0, 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:49:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x34000}, 0x0) 11:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {0x0}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:18 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:49:18 executing program 0: 11:49:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x400300}, 0x0) 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 11:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {0x0}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:18 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x20, 0x0, 0x800, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffffc}}}}, 0xa0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000500)=""/248) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 605.723028][T22968] BPF:hdr_len not found 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 11:49:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) tee(r2, r1, 0x7fffffff, 0x0) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:18 executing program 0: 11:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:19 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 605.936165][T22985] BPF:hdr_len not found 11:49:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 11:49:19 executing program 0: 11:49:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x81000, &(0x7f0000000340)={'trans=xen,', {[{@access_any='access=any'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose='cache=loose'}, {@aname={'aname', 0x3d, 'vboxnet0D'}}, {@loose='loose'}], [{@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '*}procvboxnet0)system'}}, {@subj_role={'subj_role'}}]}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:19 executing program 0: 11:49:19 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 606.184034][T23002] BPF:hdr_len not found 11:49:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x1000000}, 0x0) 11:49:19 executing program 0: [ 606.365778][T23016] BPF:Unsupported section found 11:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:19 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:19 executing program 0: [ 606.584795][T23031] BPF:Unsupported section found 11:49:19 executing program 0: 11:49:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x2000000}, 0x0) 11:49:19 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', 0x0, 0x0) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 606.763008][T23040] BPF:Unsupported section found 11:49:19 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {0x0}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:19 executing program 0: 11:49:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x3000000}, 0x0) 11:49:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCCONS(r3, 0x541d) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000000)={0x40, 0x3f10, 0x1}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000140)={0xa2, @time={0x0, 0x989680}, 0x1, {0x3f, 0x81}, 0x81, 0x2, 0x7f}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3de30c38f869970cd6cdda784d35188a4dd4a2715d84800e35661167cbebde6630e2bbc14855736b4c2728da271ab96684b1d5814c2c2b2dad23ecec94279ca4caa0dc1dd38644fac92c4531a41d72d065c33713a1276fede2a15e9fcd0c2c5d1e787749908af1a83f61ffbd1a283a9884b38593a17596faae690da3129799658895eb8fd25bf4d6af747d93a64e4abd2faff2cb3db7", @ANYRESHEX=r2]) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000080)={0x10}) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:20 executing program 0: 11:49:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {0x0}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:20 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', 0x0, 0x0) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 607.063397][T23060] BPF:Unsupported section found 11:49:20 executing program 0: 11:49:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x4000000}, 0x0) 11:49:20 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', 0x0, 0x0) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:20 executing program 0: 11:49:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {0x0}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 607.329296][T23073] BPF:Unsupported section found 11:49:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:20 executing program 0: [ 607.425566][T23080] 9pnet: Insufficient options for proto=fd [ 607.446742][T23086] 9pnet: Insufficient options for proto=fd 11:49:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0x0, 0x2}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xb7}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000000000)=0x1f) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfTno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 607.526937][T23091] BPF:Unsupported section found 11:49:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xa000000}, 0x0) 11:49:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:20 executing program 0: 11:49:20 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 607.694017][T23097] 9pnet: Insufficient options for proto=fd 11:49:20 executing program 0: [ 607.774384][T23097] 9pnet: Insufficient options for proto=fd [ 607.812470][T23108] BPF:Unsupported section found 11:49:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xe000000}, 0x0) 11:49:21 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:21 executing program 0: [ 607.987020][T23115] BPF:Unsupported section found 11:49:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:21 executing program 0: 11:49:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf000000}, 0x0) [ 608.212746][T23135] BPF:Unsupported section found 11:49:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:21 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:21 executing program 0: 11:49:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0x5, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x2d, 0xf9, 0x8}, 0x20) 11:49:21 executing program 0: [ 608.454089][T23150] BPF:Unsupported section found 11:49:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x40000000}, 0x0) 11:49:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:21 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0x5, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x2d, 0xf9, 0x8}, 0x20) 11:49:21 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 608.707366][T23166] BPF:Unsupported section found 11:49:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x60000000}, 0x0) 11:49:22 executing program 0: 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0x5, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x2d, 0xf9, 0x8}, 0x20) 11:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setregid(r7, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f0000000880)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xd00}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@seclabel='seclabel'}, {@obj_role={'obj_role', 0x3d, '\bGPL[j\x00'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 11:49:22 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 608.948610][T23179] BPF:Unsupported section found 11:49:22 executing program 0: 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x0, 0x0, 0x0, 0x6, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:22 executing program 0: 11:49:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x9effffff}, 0x0) 11:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 609.147318][T23191] BPF:[2] Invalid kind:0 11:49:22 executing program 0: 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x0, 0x0, 0x0, 0x6, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:22 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r3 = msgget$private(0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{0x0, r5}}) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000000)={0x3, @bcast, r5}) ioctl$FBIO_WAITFORVSYNC(0xffffffffffffffff, 0x40044620, 0x0) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 609.422160][T23211] BPF:[2] Invalid kind:0 11:49:22 executing program 0: 11:49:22 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, 0x0) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x0, 0x0, 0x0, 0x6, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x39, 0xf9, 0x8}, 0x20) 11:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:22 executing program 0: [ 609.687403][T23224] BPF:[2] Invalid kind:0 11:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:22 executing program 0: 11:49:22 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, 0x0) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf6030000}, 0x0) [ 609.837932][T23232] 9pnet: Insufficient options for proto=fd [ 609.913985][T23238] 9pnet: Insufficient options for proto=fd [ 609.933819][T23245] BPF:[1] ENUM (anon) [ 609.949409][T23245] BPF:size=1 vlen=1 [ 609.956886][T23245] BPF: 11:49:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7746051477ece68011a46e2d7ebb1278", @ANYRESHEX=r2]) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0xce1, @mcast1, 0x2}}}, &(0x7f0000000080)=0x84) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000340)='bfs\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x8, &(0x7f0000000a80)=[{&(0x7f00000003c0)="5b6e138e", 0x4, 0x1da6}, {&(0x7f0000000500)="6c7dcc8378c66e613ab152ae04ce2a38f1ef938cde41cd2df35b08d76c4766e484b6e86b3557839bb1be80298af589a005c16e3f8d850716b01909b316c9d8536168dd26e83dad0c9906b9048ec03f8b8c02187593b452ff18015997d507144c38bc6566331b0d27209f6d8ace", 0x6d, 0x1f}, {&(0x7f0000000580)="f49e5a508ca30464a02940471544bde7ed8a4249ce531e82ee9aab9426348e84c54b4ffebf856f39e805ab1ba2089abc511b277da6d54672493488ea62227ac95cfba420ab14e207f2f1476de2b4ec0d888b452a7c9f6e370286c9a147956cbb52800bc8de1dac86b939366a6817af0623ce323beecf2b85e6f6600a2c449eb2a53f962fa6a82a96178222d4b562e353e1126da3e2179c4e736802b74ac18d45373e27d80011b970916f1f53", 0xac, 0x100000000}, {&(0x7f0000000640)="3269730e23c31e4be4d75271ee9817ca0531003c0462d0debc0b40bc2a153d18b6ec36b472c4ed4aaa0809c7a26e239a5ce008acb01042a36f94c7d92564eb326afc82b539297131bce9fb308eccb384fa7c16e1aea439c7f542d1298d9528c5a17f38216f0685de677e1233bb2b779aad2ea79736fb60d52c7a60ee927dc2f9f9a08b5d184ce7b2d29f46c0690591896024739754d473fc72", 0x99, 0x8001}, {&(0x7f0000000700)="bb6ff5f818c9217f7fea43f7fd2a98252f46ee577db64f1494ee9cf2c85488d9994c41cf19d69396b334806172931c48b730fd0ef903c091639c9467", 0x3c, 0xffff}, {&(0x7f0000000880)="90c8dbd9ee473dc40010bdd1d214047c3532971159af2a0e5911b64f85cc0d776f19bd728408e10cdb4c6c7b828e3f2099cd2bcdfbd9b580f0a98ee255405fd0e36c09606a905a347ab1109aa320f09071c270766b0253c0d29f2a0b409da0a3cf81b062f5cd816dc39fb2636739f011dc66146d96e14c4cdd0eef05b6e66f1278547a4ae7daa79fdbdc6a588b82d8e4acc6a42c1fccc2e57b296d6d33243914d5", 0xa1, 0x8}, {&(0x7f0000000940)="59cf01b4d895d4b24de5eeac6ee109731b58fe181d50afe955711ee41de73527a03b8fdce4b03c0d5d87086d0a2d8dc551481a13c9f2827db244d3d9e03d9ab24dc3c1c19ff85c71217150e7ce5cfe0848da8e92ebb9e8701b7d8aed5e40b4131e12b8f3d5680692567dd564643472ba646f47bf579cb64b11a2eee9926477092b05987089bc37758e1e1fe041b743d0db06d25371e2986b653780d10d92095b291a3fa66478151433c6bfeb72d7343d4b17ff8403a6d83b52fe08a8b493da54d28b0fbc7b60f11e1e246766c3ef1e1a9f2c12c0872b57", 0xd7, 0x2}, {&(0x7f0000000a40)="f917510e0f2c0a18b64dcf84953774fc17bf55c7121ecb5070228eb4d06bce8df05c425c311a1e4367dc836a30bbf3", 0x2f, 0x5}], 0xc0041, 0x0) 11:49:23 executing program 0: [ 609.962103][T23245] BPF:Invalid name [ 609.979317][T23245] BPF: [ 609.979317][T23245] 11:49:23 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, 0x0) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:23 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xfffff000}, 0x0) [ 610.165713][T23255] BPF:[1] ENUM (anon) [ 610.189763][T23255] BPF:size=1 vlen=1 11:49:23 executing program 0: [ 610.213101][T23255] BPF: [ 610.216966][T23260] 9pnet: Insufficient options for proto=fd [ 610.231143][T23255] BPF:Invalid name [ 610.251134][T23255] BPF: [ 610.251134][T23255] 11:49:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x4}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 610.271214][T23260] 9pnet: Insufficient options for proto=fd 11:49:23 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x0, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:23 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:23 executing program 0: 11:49:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xffffff7f}, 0x0) 11:49:23 executing program 0: [ 610.526704][T23280] BPF:[1] ENUM (anon) 11:49:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = msgget$private(0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{0x0, r5}}) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:23 executing program 0: [ 610.554512][T23280] BPF:size=1 vlen=1 [ 610.570531][T23280] BPF: [ 610.577338][T23280] BPF:Invalid name [ 610.584688][T23280] BPF: [ 610.584688][T23280] 11:49:23 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x0, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:23 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:23 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 610.774254][T23297] BPF:[1] ENUM (anon) 11:49:23 executing program 0: [ 610.816885][T23297] BPF:size=1 vlen=1 [ 610.821642][T23297] BPF: [ 610.824614][T23297] BPF:Invalid name [ 610.828612][T23297] BPF: [ 610.828612][T23297] 11:49:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:24 executing program 0: 11:49:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:24 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x0, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r3) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r3, 0x0, 0x12f}]) io_getevents(r4, 0xd65, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000000)) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 611.028953][T23314] BPF:[1] ENUM (anon) 11:49:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xfffffff0}, 0x0) 11:49:24 executing program 0: [ 611.077390][T23314] BPF:size=1 vlen=1 [ 611.096539][T23314] BPF: [ 611.110422][T23314] BPF:Invalid name [ 611.127344][T23314] BPF: [ 611.127344][T23314] 11:49:24 executing program 0: 11:49:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:24 executing program 0: 11:49:24 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x0, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 611.297238][T23331] BPF:[1] ENUM (anon) [ 611.306707][T23331] BPF:size=1 vlen=1 [ 611.310636][T23331] BPF: [ 611.315067][T23331] BPF:Invalid name [ 611.318900][T23331] BPF: [ 611.318900][T23331] 11:49:24 executing program 0: 11:49:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x3000000000000}, 0x0) 11:49:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 611.567108][T23348] BPF:[1] ENUM (anon) [ 611.598209][T23348] BPF:size=1 vlen=1 [ 611.617993][T23348] BPF: [ 611.635898][T23348] BPF:Invalid name [ 611.660681][T23348] BPF: [ 611.660681][T23348] 11:49:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x810000) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:24 executing program 0: 11:49:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x40030000000000}, 0x0) 11:49:24 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x0, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:25 executing program 0: [ 611.857684][T23367] BPF:[1] ENUM (anon) [ 611.868080][T23367] BPF:size=1 vlen=1 [ 611.889722][T23367] BPF: [ 611.899371][T23367] BPF:Invalid name [ 611.913450][T23367] BPF: [ 611.913450][T23367] 11:49:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9, 0x8}, 0x20) 11:49:25 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x0, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:25 executing program 0: 11:49:25 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {0x0}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 612.117920][T23379] BPF:[1] ENUM (anon) [ 612.146818][T23379] BPF:size=1 vlen=1 [ 612.150772][T23379] BPF: [ 612.160691][T23379] BPF:Invalid name [ 612.193551][T23379] BPF: [ 612.193551][T23379] 11:49:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x5) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:25 executing program 0: 11:49:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:25 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:25 executing program 0: 11:49:25 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x0, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 612.351690][T23394] BPF:[1] ENUM (anon) [ 612.371081][T23394] BPF:size=1 vlen=1 [ 612.391937][T23394] BPF: [ 612.418790][T23394] BPF:Invalid name [ 612.434563][T23394] BPF: [ 612.434563][T23394] 11:49:25 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:25 executing program 0: 11:49:25 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:25 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x0, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 612.646328][T23413] BPF:[1] ENUM (anon) [ 612.685881][T23413] BPF:size=1 vlen=1 [ 612.698680][T23413] BPF: [ 612.722278][T23413] BPF:Invalid name [ 612.742260][T23413] BPF: [ 612.742260][T23413] 11:49:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 11:49:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x300000000000000}, 0x0) 11:49:26 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:26 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x0, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 612.963151][T23434] BPF:[1] ENUM (anon) [ 612.967752][T23434] BPF:size=1 vlen=1 [ 612.984454][T23434] BPF: [ 612.989742][T23434] BPF:Invalid name [ 613.009499][T23434] BPF: [ 613.009499][T23434] 11:49:26 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x400000000000000}, 0x0) 11:49:26 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180008008003950323030302e4c96ef15640cf8bc693f5ec9154a614f040000000000000001659857f30e0000540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867077b74515bab0db5fc04e81ea03210a957d3f131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000140)) 11:49:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 11:49:26 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 613.436308][T23462] BPF:[1] ENUM (anon) [ 613.450937][T23462] BPF:size=1 vlen=1 [ 613.464677][T23462] BPF: [ 613.484220][T23462] BPF:Invalid name [ 613.492721][T23462] BPF: [ 613.492721][T23462] 11:49:26 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xa00000000000000}, 0x0) 11:49:26 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:26 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 613.731297][T23485] BPF:[1] ENUM (anon) 11:49:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xe00000000000000}, 0x0) [ 613.773328][T23485] BPF:size=1 vlen=1 [ 613.786481][T23485] BPF: [ 613.789406][T23485] BPF:Invalid name [ 613.795150][T23485] BPF: [ 613.795150][T23485] 11:49:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:27 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x44, 0xf9, 0x8}, 0x20) 11:49:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 11:49:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf00000000000000}, 0x0) 11:49:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x80082102, &(0x7f00000001c0)=r6) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x3c, r7, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x30, r7, 0x400, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfff, 0x9, 0xffffffff, 0x9}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8}, 0x10000) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) [ 614.105202][T23504] BPF:[1] ENUM (anon) [ 614.122057][T23504] BPF:size=1 vlen=1 [ 614.136103][T23504] BPF: [ 614.147840][T23504] BPF:Invalid name 11:49:27 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 614.170796][T23504] BPF: [ 614.170796][T23504] 11:49:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, 0x0, 0x45, 0x0, 0x8}, 0x20) 11:49:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 614.506163][T23520] tipc: Started in network mode [ 614.512053][T23520] tipc: Own node identity 22a5de885eb, cluster identity 4711 [ 614.532105][T23520] tipc: Enabled bearer , priority 0 11:49:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, 0x0, 0x45, 0x0, 0x8}, 0x20) 11:49:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x4000000000000000}, 0x0) 11:49:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 11:49:27 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 614.585309][T23520] tipc: Enabling of bearer rejected, already enabled 11:49:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:27 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, 0x0, 0x45, 0x0, 0x8}, 0x20) 11:49:28 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x6000000000000000}, 0x0) 11:49:28 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:28 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 11:49:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000000)) 11:49:28 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9}, 0x20) 11:49:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), 0x3) 11:49:28 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9}, 0x20) 11:49:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 11:49:28 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) [ 615.531616][ T26] tipc: 32-bit node address hash set to 88de157c 11:49:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x1) 11:49:28 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:28 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) socket(0x0, 0x0, 0x0) 11:49:28 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x0, 0x1, 0x0, 0x6, 0x1, [{0x3}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0xf8]}}, &(0x7f0000000380)=""/249, 0x45, 0xf9}, 0x20) 11:49:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xf603000000000000}, 0x0) 11:49:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000280)) 11:49:29 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) socket(0x0, 0x0, 0x0) 11:49:29 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:29 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x8, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 11:49:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) r5 = socket(0x10, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0, 0x0, 0x20, {{0x0, 0x0, 0x0, 0x7, 0x0, 0x9, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0xffffffff, r6}}}}, 0xa0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) r7 = dup(r2) recvmsg(r7, &(0x7f00000001c0)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000340)=""/148, 0x94}, {&(0x7f0000000600)=""/250, 0xfa}, {&(0x7f0000000a40)=""/229, 0xe5}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000500)=""/111, 0x6f}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000000800)=""/144, 0x90}, {&(0x7f0000002b40)=""/118, 0x76}], 0x9, &(0x7f0000002c80)=""/65, 0x41}, 0x20010040) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:29 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) socket(0x0, 0x0, 0x0) 11:49:29 executing program 2: readv(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0x10, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020040880, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) 11:49:29 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) socket(0x0, 0x0, 0x0) 11:49:29 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:29 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 11:49:29 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:29 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:29 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:29 executing program 0: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x30}, 0x30) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 11:49:30 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:30 executing program 0: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x2}, 0x0) 11:49:30 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:30 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x80082102, &(0x7f00000001c0)=r6) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x3c, r7, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x30, r7, 0x400, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xfff, 0x9, 0xffffffff, 0x9}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8}, 0x10000) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:30 executing program 0: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) [ 617.462143][T23709] tipc: Started in network mode [ 617.467303][T23709] tipc: Own node identity aaaaaaaaaa17, cluster identity 4711 [ 617.485871][T23709] tipc: Enabled bearer , priority 0 11:49:30 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:30 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x3}, 0x0) 11:49:30 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:30 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x9, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000028c0)={@mcast2, 0x0}, &(0x7f0000002900)=0x14) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002b80)=[{{&(0x7f0000000140)=@un=@file={0x1, './file0/file0\x00'}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000000)="4e3615df733395b24cfc5850ec1813f10c7048a67d497cb44348cf26bd607b81b44274", 0x23}, {&(0x7f0000000880)="9d7c52f78057a0a724c18751cf332ffb0087bdc013e94fbb13b7758887f7755c668605a454692c7f71c5a61a514728c90c26a8d033f2fa30e8430d7de4be4636ae69672fb7fc056c25e36349a558cc4ff7862fdb13ca100db57d7901936c3dc3b7cc0f33434a82cac972580fd867d17ee880ed3689bb918dc293a96d18d2bece93bd9fcbaa14c0a9969e5ba59fafdf3121c63733577b63eb1a6e72e5221279d8aed008be87bc1ae9ba472760de562d0286cc4d9c1750ca24d258d5aa54d50b4ccef34103695d27a648d6a259802df21bf1b39fe0271a427b16427bdca41b3f31973fb98cc9035424210610db89cdd2b519457a4c1b266759b63c78dac1ac2df296bf2a1b44588c9e764444305928673c8b1be9a4db0724aa017e82764c319ad178789a3726752f215dae9a9fb6ce629639d0709949bdd8d89daf155e78a022e529be670f5a76b62187b8fb843ecf1c9ff939eac84dfbbf4a6cbe371c15b09a98bdbaa2ff2abcbcdea41c19ca8d33edd3e1758a1389214ed40337cbe5166440c545de0c3672208885db30e95851e05155d7aae1bda50bb811853825d177483c49430ea06ea4844d5f526620595e7cbc22b7d20cfa7ad15771ecdcfac3288789bbc95c92b242712f05d7a72fe44fcbc6c6e187f23c01534311cb390872c8a63057567d4431009d6074fb57589733b14a8f149bf2f3f0d68600846826a0d1ebfe001297ed578b42e14c4c0033f4779f8ec236d541100854121b06470e7204b10c442f1d9d1cc7a4e4600d1c6adf4ea0f90dd8503629b105767544abe4b07e2901f74886cdc8ea35d6eccaa91f5d05f5e99e996d07363617d732a33bfb70aa42f4b91c4c306b20eda2e40cf40f064f44ac9a1f7b7bb5e97978d09519a5a1c10390535ae719df7cb5a0bf9aa9521c2c3e2d4debedae3f296d5071c9e9adce169816ffbf3fda99baaa77def4e881cb2a439733cf72e9b439b59103dccb68b4c69b3f74eec6054f44fd9b20e344ecd22bfa06723bb7921b6dd4fef299801448b70d995a8380539d50c1fcd9af27dea821a7d8511e8db09bad64897ae36e3c7aa9ad89f8601d5a7aaf0bc04148abc805f6feee84cc5f3405a75666b3a522aa88c983ec5db678d9ab6d2ffb5bf1a9a08ea0f6cdfdf8cefdc5360a1ffba389f80ffb8dd2914c91dc002d052a977c54876e7d51df1b3cc3d3e8ee518e8d284284e10a32e8805ec4884c8fc3b64d76e86c5498127e7fd505f00c724498a4628e6a5c38ea162413bab3a12b199bd57e30b95b6f2499ca23ca80639c558e3e6faf07cbbc4e24570b53fd08b6df8ed82ac46dec9d32371038aa0827947af5e49d2c05967bc4dc55ee72711470f593351ff596f5e8b36e21e979d98f7193d19e58af2903366bbf4b5048ed043cf659da2283d8662808637005643ef8a808d28111d4f856f05ef11b5fbefc551ffac3dbe003c79bf666cf40cb6c17d44b067cac1e426ef08d7fbab8e15e127676d75c3d5ad406f9539049cde5a9b4dafeb040c794fa1c6834d04e237b3c00fe62967f1b52fb202cc0451de72d3e85ccd7b406aeffa2f4585a7b51f1b32a1a5e2ad09edb8d5c36fc8099f41f569fd491a1a1debd94845b7006a557ae9c7222b8b057a5a6c0cd6eb9fd32f8ee7449e464a7a18edf8063e03784711be150f1926b98734158e88f0d0cc1a6edbdc4138933208e1232142534182f91ec545c69152815375f01d8ad3255db275ffcd06a285b8de8c5294fc49658f87807c9080358564512536c47abcc554163b8ab38ff8816718d6822c4d051effe3e0823b0dffef9a320e7c76a93a023998792c18d4972360ab0fda0a748b78e3636dabd07d0bc5cd1e62760f00a159aea93f2f56f737a7f4a75c9f6be6f1cbe07eceacc4d3846049bfa89f0ee73a23d100c226cb12bd7ad62ec1062898f76cad9493e7d0487b934d797f64e5ac8a8ea5649001d50e72fc2b4918443fd37e5ff7f6df6ab972f4a42c09cfdd0663512fb66d3a34f7d9a3759c2d052492fb9dc6947cfc344805149116ad2390a3408d15e89638c58a423d981bd27006a9b6c70173faa264c824d5f18f6d6db881b807acd2bad11c25a4d76886daddbc19043096b40f14b72b6830c537429bd435a081f067c92422b938966f5abd350c21b4f7688a465bac4fe36083ff6006592e731bcef22354e41cdb8079373980584f36f2a1be775dd8133ff5de22b9de61d963d3d9f42a557c436e15f2eefa3857f0f190d4b05aade423e5d78b776a450ec7997d544c66b5def318b31ef0d6e7b9bc4e7c9929c0128822aae81f6a726c8f166512a6c30a88a09ea1c5b043b54431491c9b8356a1001e17c635ea59a10cede180431388fc93adc544b0948f3016491ca829d47ccb5f71e8b7d989af042eba5444fe69daf64b6f083051d21c5708039ad29602cd9da554082bf8204515b028dc6d169f1b134c97deb57de00bad594700d76f08073825bad347c0527df12549c8ffffc069d38dfc0bc9ae8b3f503083ea73b40a4779873931c26f5fe68ec2c3951285c372f91237fd7886928cd083379b81c4aec800f89abaae3e01ccad29add3126c505424772adeb5b5aebcaf1c735e22c9536184a6e60c78f37a440420fcd2adb6f4fafbe551741c773ea44dec714bcca87d383ce8e0dcf3084d50ff535e62f650a631a2ec2b5cb9ce48ba7a5c66f391ddf61a20b6692daa7792deb62b5331fa763a2c95c067055f7e2a91b64068d4e35c239257a9687159b50a5437cf152056dc0ad54ee21a94a632afb8600a47435ba1abfe7eee2ba783c3af5b8bbbfdb015614b775d9f8a628b1823695d69f00c5abd1e85ea7df60ac369a9f9db7a5faa52071575316d1d9486cd5c8f7325b83566c6843d5617c601106ac52862f0e3d467899c90803f018b6f6a8b2266957c7a5c2409ce156dea6cd37a160ffa9914ef932ea759992d1e3f8216b4ecaa6942b213b9205f78eba2831f7afcf158835213e023312c95a7502e92d84e27891052b1da16413b56a82544d4a066aebaa71ae4579baaa09d1105cc6d6c3f86e147929565980f2d9f7aff5b5297f0f298ec25dad76bd2106facf9c733ad568d070e2c54d2df2694ca79f45ceceae584d6b508024237989a48369c813468a5d13bf18b639cf005caf7c704b57cb5ad2224ef10ac560274b6871f7cdd7d340754afbd050a4ba8b7fc876bb750986571c4764b4b805f7e460b2988434acb67f8da10149707d43683d0c4b345d56e007c60ae2d8a0d33c0a18a88c5200652f2771c20769bc66a7a472a35d4373d838fafa0e28f71e980eb3f1d0abd3cafeab385b3693199ec5eab35df7f5400660fd484b601e43242a1d41303dd74f77c31aaaa4d21dc7dc5c7ea6aaaa3ded9229df2cedcfa4ca575379d993a5d9ea5adcb772d4721f2329cb90653aba937cbb3fa7f28ecb08f2ab4f1b5fc3394ba59a5110154901f0c4a58a43add56b755a972baadf15abe03e0da0bc7da227a2bee10c42b9f237157f0d4babf6fd57339139f8981c9a5249a5481b43321a8b71323ce83b570278e9be2b28a5c1ca56ce03d27450012bd8ff2feff7075c54dccfe7106ceb2f72804ef103edc7300adb482099cffc5bc30a93544fdd3ef0bc2c2df47ec081dc8ec7ae570d5bedfcf1068b47ca3c9f25df2c81e26a127a5f1a4c9c036b255a6f90d0ad29bdca69f71199af0c7f00984bd513db8ebebf36420673c9ce887336c53f7dbca19a9193611791b937617d6f6c31d3e05b0e55f547afad9b55a488d1915257266b70199415baea8380b7927d17717d046e1d5cb505ffcc8b7675dcabf5bc355f3414e6e1205651f473d79100df2ad2361202a7bd557730e17844c4b08c57a6b10b5bae05d0320daaf60c2b13aca59ca8c4c5870556ffce688f570fbb908aaecc72fba19c350b123a67e766674b80903b466ba2e5c7c8c4266b770c49b9d29cbac47d1dea70a9fc7b15b5de1a447dddd0cf16266750d48d451034e0595a6f82234a8d1edd9ba0389d794c491b54fedcb9b91d6e82386463fe581e9e7d156fdbfdd286259dfa289007110df27c76b7f485662eb4aecaaaaa1de3b8368026ecd75d4b0b0227744e52a82725687afcd022555d75d69bab0aa3e4b99d91a5e12f383c9cc2b5f968eb0df10f2edd83cb9f7b4e44047fcc85e666bd4d7e62cad94e0596a233080f12fdf40d92d77224f656db78845e3128115d2da16b37f13ca4b14899126e804d6700b41e74a123f09e5cfb70085fd58799750cf705d3c39ee71fc4c0d28f55ec4010924b23cfff024a5c92a178c216005f6f56b8d5b8f87cb14d7155e0d0af4fbb323d1fbe9621eb5f65b2dbc8653a9a8d984bbb5d21f7980d7c925dde1ac21c64a8081e7e09ccfcf3adb9276b66d150f826116bda6288a11dcce79be4e1c22f4c8f3267d0cd6f9fa9ed6e0becca8d81f2d6f778187ef922eff606e68853f6e4b9a5f2cbb6b2b59143307f2bac294af2e3a17c4726e8a64508c37f7a63b863d28cb295ebaef63db6850db01aa7ae3d1513b487105d34884d139b4da40b0f6d76de1e95723d4e17ae9fed299355626a4a1686c6c395060d386473137d1215f29340a3176402e8a75e6d7892a3a86763c7fd149b0ac2fd73b542f58267e122f3eb4283f98cae9751db10642332de2f445aec0d9c09c1ff7af4bf7fbbc7b55ea43756b163ca9066b8d7a684838357878d05c6eb14b5648247ae430516be37776a0acc9a4242c78835a43daa2556226520181c331097768dc45d86a2792b230c02075c0b61785240c9d421ad072e0786c789f711b69ddedc17287146a8328909b5fd2bef510d2ef7993d9fccc7d5fcaeba46b946ea03ff960c0f01c653cab8ca07e5931c3ef6937003fa44e57c3897d13a9c36f0b0ee094c735225600b83a0cc4c373da4bc991e4fb1fe040720b3d3bfbd3821893b792a73cf3d9a764a759f5789de98692eeee8fe810a0887c970f2e9b09d9ee487d101948e888da5b52f665e61ccb30a06aa38a0803e55be44c76b60ee78d1a840460b11612b2915fbc665e63f5758e11a2ee13323704a9af84025e787b6958453ce0282a35d89ef1e96f2d8d5f4057b0988568873e50a3f761f1d0cff0480d99147168b271cc3016bf7e578526028af7f336775900fb91944f1ee390d6277b2c336314bbd7b219302e7feb6d682bc35317434ffc8768d24217198c3a3429577aaae2f258fa6ba322aa6f0becb1fefc165690ccb9200bcbaedbe308a1bff0ca48718581b1120c72b80601a5a01872c695780bc79ec1c40946cf74d2d4e3f0d351cd5171771a0f50aeea807c9a476de1354f12ce005126e1aa1f79ee94a6d8015b055d68f438ace88012d2855bb3d4f33cf36c83e4a13963ec05ddda37375813a1b63dfc0ed94daa3624fd6d9d7cd97671b7e9523bf011853a85128d03055de1fa4af35ef6c88e45e180b55187bc759ade955b7a9e010d61c93c6fe56a0d209a085cc85ca3db6db8da6574111f8418879663fde67673781e7344a262ad33e6dc4b94033e16a4f8e75e0fa5092716413da7d549de92364ffa4175a6f8bbb9d6ed1ea95f77cad0b7ca4e258e802ce70ddd8b9723764cacc51df884c0b10d6e8520059dbf7d12919a336e610cb3292780a6e1dda5922ef33cece5a87e7e1e4f999e207355dd3a15d63e8c7f501032b792e5f424bccb055116dbde0ea57c1105ebdc817538839ef06d9c1e45ac2a6cfde89be0b44c6da8a876f4ac099ff63f1f22dff22d9823b917074a1c1602a2adab11a3dd339b391", 0x1000}, {&(0x7f0000000340)="fb56350f9411f856d2e146f164615a7762c847a9b2aec9bf0c0d8dadb6f9750faece0af406b519abe17eeae946316db68c4bf9245f2253dc0f4bbd6d060893741f5411b83089caeac8c071504093914c7dad9a3066822b1f88f39a745752b5ea87b506e1d84806e866a97fd64047ac531d3a0932447fc0187859411e6a61b74af2c3ff65e7074e4a6e20d0fe5e818dcebdd76ec55d70ff97d134c151", 0x9c}, {&(0x7f0000000600)="32e827d44ad894092acea44e25169d11c7d0b6583ebd64a12eca573c3525492f8184595fb9a545c1f0d80e71715b570f439763d0a822e0001f2232231f1b39acc1c68014e5dda5db8211d76360d8fa51b3f0abdaf400eb1d5c8580df526f58d105e1980f8e7869e7e63713eb502531b5fc8aa35dffb40bef0caac40d26f677cf7519596731f41f2fde6f62e41df140c7fd11dbf760b043054d7b1746293459c7ab76e9289c97d5a38df7732b7e5a9ae336d66e2beb8ffd2031064756941041abe4f5cfd66a61bc604ac4372989e0df371302920b1e5da0a2b3d1bc6128b6511dc9e7e3", 0xe3}, {&(0x7f0000001880)="1788619d45df0b5c203c45f04a04105e298fc8b0aeff37659502740207fd99989cdec4511267a3bbd66f5913e27866bc3da8e4a8224238497a9db5de2b26e3f95ad27219604eb8e331c5d363dd41628715239aaa4b45d53b28a9eecce46ee07f0a330079fe29f54934dde2a7d74b477755b049a0ec3185500bc8200d7792bbd8f9850063bbddb2f3ccbbb9ccd69a12baf297462982df9ba5379f72dc74fb1f0f12c8b823fe4c4616fd50915a741c0d00d2a9edeab428bea778b012beaada5b52a2710570549a82bba4ce686dd713537648efe1", 0xd3}, {&(0x7f0000000080)="bc3d4c37de8d0c7ebffc8754f3134c38baf56ab90ead3c7888192b7b6c5851e5df8356eee5e1", 0x26}, {&(0x7f00000001c0)}, {&(0x7f0000000280)="8332bca6a85a2308a914e008988226f398ad5bb2e614ef955b990202349a2814588921fe3fcbf6e280229d38641bc3bb67b8eb86bef570c1f60e1ac450afc2250f8e28f88280f5cebbf0e8", 0x4b}, {&(0x7f0000000500)="ba734bcc5a7eb9199b7bb89663422969d55f91ba7a49a456c9f666c53ba9cc517fa204343a4fb0d52c67c50a7c2224dc81807feeef12472361d399d766b6502079284f589ff003fb224e40132c903f587ce370549af33bf3b47b37d6ac1d1dff0f31eb", 0x63}], 0x9, &(0x7f0000001a40)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}], 0x78}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000001ac0)="a9af017c658cbc5e2f26f44d814ceef349c182ea0b32cbeb93ffb720722f32c5dfd368156d6ca7480aebcf3c6ed6204b5300c0d96d3655dac3c79b79e6db0121cf7f933d7d9f6d25b4eb0bd8d90d81f7256ccac5ed9232bb5a1a9fdfb60f8176dbd74ff80799207b0e809fe175679d2d83c389193921f15176f7ccf051afd49ebeb59f29483182ec1c1190ac", 0x8c}], 0x1, &(0x7f0000001b80)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x7a4}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0xa}}, @timestamping={{0x14, 0x1, 0x25, 0x86f0c1e}}], 0xa8}}, {{&(0x7f0000001c40)=@un=@abs={0x59202cf2b4167198, 0x0, 0x4e21}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001cc0)="8e17557b168ebb9a702e649ca3481b458d9d28320fabe9133c669c5ea666ee5db6d24f6425f5a7f6d3640c811a3a18515477d5cc7162b263019ad6964676869b8f1f7f54a558a9d4e926838d6626357d0a1b4493a4", 0x55}, {&(0x7f0000000700)="67892d82", 0x4}, {&(0x7f0000001d40)="84226e3f5136f49ff7fb164fd05d11aa9b34c0d9c7df341b35fba180cf893c56a790f4e85d07161c3294175ab8d5b2784985ea1987ae6d66d89aac793a848814c78021c49be866d1", 0x48}, {&(0x7f0000001dc0)="bd8c1265d00f2b0d983cd5a8b47398abd3dc47d396a7c2ca577684ca6c42927ac96fb2796f05cf0fc9665127313ef97da61cd96096a627f0062497fbdf9d5ad37c483c94956cd492a18794f4519bb3a851907c079a2368ad6b1e3db89c2d60716fb0798c16607ff8edb50dd008053ec7f75b036983c512de1ccb3744e539c411930324b1e211819353d0e414e5b93ef7c5df1bf2a0cea274f1fd1bc901a367fdbd25d75aa216dae89b63c4f9f39c10dcdbffc53cd3539a0a2a767f8ffe1b6ce74cec9a67a9a27ed64a940cfb42b4f8b40f7c701caa49767b31d7be6583c13fd62e2a7e8ab8bc344c521884fb639e7e830aa379579d847b50", 0xf8}], 0x4}}, {{&(0x7f0000001f00)=@nl=@unspec, 0x80, &(0x7f0000002580)=[{&(0x7f0000001f80)="0eed9d82342869cf86b7a3405be043118cd33e3e4680e75c0470219a4e9acca25cdb10134730f00c618fa346501471efdb7d3f5c9701ca2381f007e74d7af481f428589e3f486c14a436dd5404f700ff0cc5aece8ec5e3177f", 0x59}, {&(0x7f0000002000)="4a874610461b31e254ea998730ce6402083bc84f1c7c278a01d1f18bc54d8abbb479203554712d58077b0e60be4ee0c3444c57197ecc34c5efe318b9f986450d1400b8dc91e0efea7e4d67dc3fcb7159779cbfb3d7f5af302d2f63b2f1809463cb74787f47e18160f0c33d3a2168a23a820845f25388c46075ce3b708ab3f1161804352ab7886dfec04c47a23a71c9855c156d74a0042648dcb3a1f7702dd04cc502", 0xa2}, {&(0x7f00000020c0)="afd4a79fc0e47a64846bf462344fc7935671c0f0737a9fc326af9e56abb1a122376e73fe1f47c7901fa61d3cce6956deb282a007308df7227ec2385eaacc47a154c6c447b1887990e7c8a194c7b4790a08f0d9bf04e3547b76bb9e4cc1841365dcd5d9db2702b9c033d47c4e1e648ee3dcc2f3adac601d529c10f77cd1ab7bc98b82f79aca3842b3f68b83385b96fa95eb1754490d9fa65c9eeb3a97c09493ad13390957906aacae4b22f8b5659134e42b035897e96ca495dbf9d2cbe74c393fee552e291be47182fa86", 0xca}, {&(0x7f00000021c0)="cf7ce8caa6943f0c8e747f07a1674c160b69a3369a46f3c99e1f846f6c300ddee3501c57570f73b149636c3c153183193b45ce431b0030771765f164cae028a001d5ad9d026fb1ca36630962a0d7dcaf20e92f3cf9f0973a08869a06daa752662821bdcd80e5ee2ff7062d13e1e5f36af8e8e1976eb6ed5a4812f3851d41bb684d469f3fd942141d5e0fdf1ec1d06d0520c266a88a240229d36a0c1fb6177f8fd211e6a41a1b5ac3830629e1cd22171ac0c069f3f00a239db8c2adf5e3610beec087f8", 0xc3}, {&(0x7f00000022c0)="f964eeba33baded9fd2ddd8a23ee8a569cb52244dc39f2f03298", 0x1a}, {&(0x7f0000002300)="5ce1c8cf3ba8ea0d92ee6c80fb75d84f150e584330719c73f9dd010d943769b5677956001aa7aabe0db63b4c4bf824ed1523ae0f4e6d4dc35fcbe6b3a32f8936d8fb89290b8398a6c97c8130c5bb75300c41d65dda8e892edd", 0x59}, {&(0x7f0000002380)="42cc133a7e734830942a09e685c79654a11f48b62ffef333ee0558cbac9d23e022a17372f39c6ebed2ab92398c1cf3ac8890dfaa2bcb413136d23178f6993dfb61df99ed07df4a6a8e52b940c3d2e243cbd918f673e77802f897c3944b132404bdcdb419d8697b987cc89791bcbd0dc23031f5485517193ba18a1326d0fe0af180719f73ec94f83ab194da416f2d410bd83662dbbfcd2fcc81de7ea1fc5c72a0b2a6e79313c8495b800a9eba98d73eb1b7ab267d2e35bcefd1f5681de20f3c8ae48a59b41209bc04a34ec43983", 0xcd}, {&(0x7f0000002480)="b80f00f5385e1321395c5aa04990ef96e3468e0f046a6cbcaef4c9ebaf9a62a64837dd9d70e2531a94b831e3c8c231e7c2fa9fa13464d8bfc97f246427af6174197b0c018fad9d631505ad036d59f259241d08135dc33e00c263845f6d14e939eb8c45a90c3a8f375cf23002a6bd29d290d8ad36013b3ff37b993e6d8d271c5736a6aedc080810c282f4431d0ba4fb8345a186b5f9e39943395ca1263422f0d325a6fcf012c801b6a102639d6b641073eb51efc2c93b054933a8b82707b5f274ea695237e1a3825283c488605eb0e8aa591f", 0xd2}], 0x8, &(0x7f0000002600)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x3f}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffff7f}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff8}}], 0x90}}, {{&(0x7f00000026c0)=@in={0x2, 0x4e24, @remote}, 0x80, &(0x7f0000002780)=[{&(0x7f0000002740)="e5fc4993400709dd5357770ff390157f228d1c736d697d995b0721df", 0x1c}], 0x1, &(0x7f00000027c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18}}], 0x30}}, {{&(0x7f0000002940)=@hci={0x1f, r4, 0x2}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)="4a444c789085ba293ed9f08fb8026e63abd03b4ee540cda15e365e620aaa52660d32f756a3ca9538bf1f54005b6b54f9835142266538a1fec398cb4dc31c67a92b2b8c1bb4cf1023b8d414aa64a1ae5bd8b91790dfcb405c7015c4911f8921e8bc5b27db358c24967862f3880608d8fc82269630ab5be2c0cc9e7f336bc48b1a75edf394", 0x84}, {&(0x7f0000002a80)="db12ab1347d06990e131651a0ccbf0265624e769a0de98efb6d7c570f86e621ac05a6667cc2d452582e6b87e98d947321d5265f5912a8a8b169ca099125ca371", 0x40}], 0x2, &(0x7f0000002b00)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}], 0x60}}], 0x6, 0x20004011) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:30 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x0) 11:49:31 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:31 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:31 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xa}, 0x0) 11:49:31 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x3c, r5, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r5, 0x800, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c955}, 0x24042) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:31 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0xfffffffffffffffe, 0x0, 0xffff}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xe}, 0x0) 11:49:31 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 618.611397][ T26] tipc: 32-bit node address hash set to aaaabd00 [ 618.678487][T23797] tipc: Enabling of bearer rejected, already enabled 11:49:31 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:31 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f0000000000)={0x7, 0x2, 0x2, "8cac7be56a236f34fd11bdf84dd9cdbcf20fcd96a528642f3d02539139ab056c", 0x38414262}) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:32 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000900)=ANY=[], 0x3a9) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9\x80\x80', 0x0, &(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYRES64=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf}, 0x0) 11:49:32 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:32 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:32 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) 11:49:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:32 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:32 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) 11:49:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x60}, 0x0) 11:49:32 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{0x0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:32 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x4000) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:32 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) 11:49:32 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) socket$can_raw(0x1d, 0x3, 0x1) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f00000004c0)=""/232, &(0x7f0000000000)=0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000740)=""/203) mknod$loop(&(0x7f0000000140)='./file0/file0\x00', 0x69, 0x0) 11:49:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 11:49:32 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) prctl$PR_SET_SECUREBITS(0x1c, 0x2) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:32 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x0, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000)="42041ec787ccd5af60be21c3745e4dbd6d7cd563aad67b652d6180", 0x1b, r3}, 0x68) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x3f6}, 0x0) 11:49:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x300}, 0x0) 11:49:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0xf6ffffff00000000, 0x0) 11:49:33 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000140)="2ef3e36b69a57a4fb859c8d28b9d4c686ad79d62ab7b8f0155582ec96772d5143338c095112fbe06a5772c91e126291b858f64fa327cd82da32c3a7a80d94875441e71178946e9922774b7eb42ab267aab8b1d972f75655f9534466ec06f62fa04643e75a8e937bcfd350cd6bc28568e356161969adde8f03b57432ab4479e754a898fcb0994c6f3a0b0b076658dcb", &(0x7f0000000340)=""/145, 0x2}, 0x20) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000500)) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c89414e98ffff", @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x0, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:33 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x3f6}, 0x0) 11:49:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x7feee85d00000000, 0x0) 11:49:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x0, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:33 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 11:49:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000000)) 11:49:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x200000000000000, 0x0) [ 620.581685][T23933] 9pnet: Insufficient options for proto=fd 11:49:33 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:33 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 620.631763][T23936] 9pnet: Insufficient options for proto=fd 11:49:33 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@caif=@util={0x25, "6c8c7d5de41270573a2bf2cd873249f6"}, 0x80) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 11:49:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:34 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:34 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x3}]}, 0x18}}, 0x0) 11:49:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 11:49:34 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afac8b10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c1565452567e649cff9efb200b49675f69b16799c43511812de54b108f52469c27a07fcb28594e3b32e4ef8d192b54002099eb08edf76da7c1405d4d661902b3500e439409fe14d729d94929a8f6a3aff936f7d1f609ff494eb41f6a843100ceb990c988ed21564c1"], 0x15) rmdir(&(0x7f0000000080)='./file1\x00') r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e21, @local}}) [ 621.143551][T23967] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:49:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:34 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 11:49:34 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x6f, 0x6, 0x0, "c56841a815be6c937371151744b18eac", "293248a9117eed83042c0316cbedd4e8ee70ffecbbca10c6befc7446c4464d6e87f4686ebfdad8f26e2ba76963c6e0b6ec9bc33c876aafe7198c60ca1521dc53b8320905f830e6e5f7a15d23ae64930c7a5d40475fff9d66eb54"}, 0x6f, 0x1) 11:49:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x9, 0x7b300, 0xfffffffffffffff9, 0x4, 0x68, 0x2}, {0x10000, 0x0, 0x9, 0x1000, 0xfffffffffffffce9, 0x1}], [[], [], [], []]}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 11:49:34 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd\'rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x6f, 0x6, 0x0, "c56841a815be6c937371151744b18eac", "293248a9117eed83042c0316cbedd4e8ee70ffecbbca10c6befc7446c4464d6e87f4686ebfdad8f26e2ba76963c6e0b6ec9bc33c876aafe7198c60ca1521dc53b8320905f830e6e5f7a15d23ae64930c7a5d40475fff9d66eb54"}, 0x6f, 0x1) 11:49:34 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 11:49:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0xffffff7f, 0x0) [ 622.008959][T24021] 9pnet: Could not find request transport: fd'rfdno=0x0000000000000003 11:49:35 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 622.050276][T24021] 9pnet: Could not find request transport: fd'rfdno=0x0000000000000003 11:49:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 11:49:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="3d95ee25000100002c7766646e6f3d", @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x6f, 0x6, 0x0, "c56841a815be6c937371151744b18eac", "293248a9117eed83042c0316cbedd4e8ee70ffecbbca10c6befc7446c4464d6e87f4686ebfdad8f26e2ba76963c6e0b6ec9bc33c876aafe7198c60ca1521dc53b8320905f830e6e5f7a15d23ae64930c7a5d40475fff9d66eb54"}, 0x6f, 0x1) 11:49:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0xffffc000, 0x0) [ 622.318218][T24041] 9pnet: Insufficient options for proto=fd 11:49:35 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 622.360534][T24041] 9pnet: Insufficient options for proto=fd 11:49:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf603}, 0x0) 11:49:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0xffff8000, 0x0) 11:49:35 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x30000}, 0x0) 11:49:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0xffffc000, 0x0) 11:49:35 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x2) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000300)='\xd0\xa8\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',lA\x00\x00\x00=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000080001007366710048000200"/81], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:36 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 11:49:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 11:49:36 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2], 0x2}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000) write$P9_RVERSION(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x100028, &(0x7f00000005c0)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000140)) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:36 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 11:49:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r4 = getuid() r5 = getgid() r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setregid(r7, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setregid(r9, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x3}, [{0x2, 0x1, r4}], {0x4, 0x2}, [{0x8, 0x1, 0xee00}, {0x8, 0x5, r5}, {0x8, 0x4, r7}, {0x8, 0x0, r9}, {0x8, 0x1, r10}], {0x10, 0x6}}, 0x54, 0x2) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1c, r11, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x40004) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:37 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 11:49:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}}}, 0xa0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0xffef) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) bind$xdp(r6, &(0x7f0000000900)={0x2c, 0x0, r8, 0x1d}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', r8}) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6d, &(0x7f0000000040)={r10, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r10, 0x80, 0x966}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r11, 0x3ff}, &(0x7f0000000180)=0x8) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=dno}', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:37 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x0, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x3000000, 0x0) 11:49:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 11:49:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x1000000, 0x0) 11:49:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 624.476271][T24175] 9pnet: Could not find request transport: dno}0x0000000000000003 11:49:37 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:37 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 624.531669][T24175] 9pnet: Could not find request transport: dno}0x0000000000000003 11:49:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$FICLONE(r3, 0x40049409, r4) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000180)={0x3, 'dummy0\x00', {0x1}, 0x3}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) r2 = msgget$private(0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, r4}}) mount$binder(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='binder\x00', 0x1004, &(0x7f0000000240)=ANY=[@ANYBLOB='max=00000000000000000004,max=00000000000000000003,max=00000000000000000003,stats=global,stats=global,max=00040000000000000004,appraisppraise,rootcontext=root,euid=\x00\x00\x00', @ANYRESDEC=r4, @ANYBLOB='\x00'/11]) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 11:49:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 11:49:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:38 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, 0x0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) name_to_handle_at(r6, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)={0xfffffffffffffff5, 0x4, "3fc4197526b86250a903b15616c067dcbab294e8dcf4bff8cce0e2fe5b26247a7b655fd970fad98bf4691db6e3c781a85e840841bdb43166b6db10755378c4b0373bb9b39d724d52667bedccc1729c504cf4b09c4a0b6bdacf5bf032f8c750988642b0119ef7e7a012b54872c2aa726b86b5874b0b987c4fd2"}, &(0x7f0000000080), 0x1000) 11:49:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 11:49:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:38 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400000) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/4096, 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa", 0x4}, r3}}, 0x38) syz_open_dev$sndtimer(&(0x7f0000001200)='/dev/snd/timer\x00', 0x0, 0x141400) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f00000012c0)=0xa7d, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r8, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r9, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) 11:49:38 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 11:49:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) 11:49:38 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:38 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf\x00no=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x5}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:38 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000000)=0x1006243, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 11:49:38 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) 11:49:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 11:49:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x140, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x2) r1 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r1, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 11:49:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="ce2cc76567fb1841439a7b595934b1508c7c9941ebf17cd31add717c54fd248a1861c9ef6bbb8c73e0cb23aca92bb95b15ce94eaf94556e3454f9b9f9d9d5587290a5453e69202d20008252f88cef5be33e9a10661697e659a0e63f9fc1e942db6c30d58d2dbfe7b33fbe70f271b05de3b39b0466f11128412aa0e96db550a4b59779b6129098b9551a977e9d44cf0834215905dca888bbafe7b2c4c2dadaa47e25153", 0xa3, 0xfffffffffffffffc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000240)) keyctl$revoke(0x3, r0) r2 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r2, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) [ 625.963090][T24270] 9pnet: Insufficient options for proto=fd [ 625.997547][T24270] 9pnet: Insufficient options for proto=fd 11:49:39 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RFSYNC(r3, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) r4 = dup(r1) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 11:49:39 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, 0xffffffffffffffff}) pkey_alloc(0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r1, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x100000001}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) setregid(r5, 0x0) r6 = geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000200)={0x198, 0x0, 0x5, [{{0x4, 0x3, 0x9, 0x2, 0x8, 0xc3, {0x1, 0xe8ef, 0x5, 0x7ff, 0x10001, 0x100000001, 0x4543, 0x7fffffff, 0x1, 0x80000000, 0x5, 0xee01, r5, 0xfffffffc, 0x55}}, {0x0, 0x4, 0xf, 0x7, '/dev/snd/timer\x00'}}, {{0xfff, 0x2, 0x80000001, 0x7, 0x2, 0x6, {0x1, 0x8, 0x4, 0x2110, 0x1, 0xa7, 0xb6, 0x80, 0x80000000, 0x10000, 0x8, r6, r7, 0x2, 0x7fffffff}}, {0x6, 0xc975, 0x47, 0x5, 'posix_acl_accesskeyringvboxnet1ppp0procDppp1:vboxnet0*security)vmnet1^+'}}]}, 0x198) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 11:49:39 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400000) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/4096, 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa", 0x4}, r3}}, 0x38) syz_open_dev$sndtimer(&(0x7f0000001200)='/dev/snd/timer\x00', 0x0, 0x141400) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:39 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400000) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/4096, 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa", 0x4}, r3}}, 0x38) syz_open_dev$sndtimer(&(0x7f0000001200)='/dev/snd/timer\x00', 0x0, 0x141400) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:39 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 11:49:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = timerfd_create(0x8, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000180)={0x0, @aes128}) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) 11:49:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="3da0b13f26bc97", @ANYRESHEX=r2]) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x3ff, 0x9, 0x2, 0x1, 0x1, 0xb9e8}) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:39 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 11:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x40000000, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 11:49:40 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x1ff}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000080)={@default, @bcast, @default, 0x8, 0x6, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6d, &(0x7f0000000040)={r5, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0xffff, 0x9, 0x4000, 0x6303e72a, 0x7, 0x2c, 0x9, 0x4, r5}, 0x20) 11:49:40 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) [ 627.042420][T24348] 9pnet: Insufficient options for proto=fd [ 627.073566][T24348] 9pnet: Insufficient options for proto=fd 11:49:40 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0xa695e262a1dedb02, 0x7, {{0x0, 0x0, 0x6, 0x0, 0x0, 0x0, {0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, 0x0, 0x0, 0x400}}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0xfffffffffffffe97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000000c0)={0x6, [0x5, 0x7, 0x8713, 0xf001, 0x9, 0x7]}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) acct(&(0x7f0000000080)='./file0\x00') read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 11:49:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 11:49:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xf6030000}, 0x0) 11:49:40 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x400000) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, &(0x7f00000000c0)=""/4096, 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa", 0x4}, r3}}, 0x38) syz_open_dev$sndtimer(&(0x7f0000001200)='/dev/snd/timer\x00', 0x0, 0x141400) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x100) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x9, 0x8, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0xffffffffffffffff, 0x9, 0x5, 0x0, 0x0, 0x102}, {0x4, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x4, 0x798, 0x7f, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) r11 = getpgrp(0x0) syz_open_procfs(r11, &(0x7f00000017c0)='smaps\x00') recvmsg(r6, &(0x7f0000001b40)={&(0x7f0000001800)=@nfc, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001880)=""/76, 0x4c}, {&(0x7f0000001900)=""/204, 0xcc}, {&(0x7f0000001a00)=""/9, 0x9}], 0x3, &(0x7f0000001a80)=""/171, 0xab}, 0x120) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001e00)={0x0, @nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x20000010}, @can, @nl=@unspec, 0x1, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001dc0)='ip_vti0\x00', 0xfffffffffffffffa, 0x40, 0x9}) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000c6c0)=[{{&(0x7f00000091c0)=@xdp, 0x80, &(0x7f0000009340)=[{&(0x7f0000009240)=""/213, 0xd5}], 0x1, &(0x7f0000009380)=""/11, 0xb}, 0xfffffffc}, {{&(0x7f00000093c0)=@nfc_llcp, 0x80, &(0x7f0000009440)}, 0x81}, {{&(0x7f0000009480)=@isdn, 0x80, &(0x7f00000099c0)=[{&(0x7f0000009500)=""/213, 0xd5}, {&(0x7f0000009600)=""/247, 0xf7}, {&(0x7f0000009700)=""/172, 0xac}, {&(0x7f00000097c0)=""/103, 0x67}, {&(0x7f0000009840)=""/40, 0x28}, {&(0x7f0000009880)=""/180, 0xb4}, {&(0x7f0000009940)=""/120, 0x78}], 0x7}, 0xffff}, {{&(0x7f0000009a40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000009bc0)=[{&(0x7f0000009ac0)=""/179, 0xb3}, {&(0x7f0000009b80)}], 0x2, &(0x7f0000009c00)=""/67, 0x43}, 0x4}, {{&(0x7f0000009c80)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f000000ae80)=[{&(0x7f0000009d00)=""/81, 0x51}, {&(0x7f0000009d80)=""/4096, 0x1000}, {&(0x7f000000ad80)=""/187, 0xbb}, {&(0x7f000000ae40)=""/15, 0xf}], 0x4, &(0x7f000000aec0)=""/4096, 0x1000}, 0x7fff}, {{&(0x7f000000bec0)=@rc, 0x80, &(0x7f000000c600)=[{&(0x7f000000bf40)=""/75, 0x4b}, {&(0x7f000000bfc0)=""/213, 0xd5}, {&(0x7f000000c0c0)=""/165, 0xa5}, {&(0x7f000000c180)=""/245, 0xf5}, {&(0x7f000000c280)=""/85, 0x55}, {&(0x7f000000c300)=""/216, 0xd8}, {&(0x7f000000c400)=""/147, 0x93}, {&(0x7f000000c4c0)=""/148, 0x94}, {&(0x7f000000c580)=""/119, 0x77}], 0x9}, 0x1ac23790}], 0x6, 0x40, &(0x7f000000c840)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100736671004800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7c0000002c00010700"/20, @ANYRES32=r2, @ANYBLOB="0000000200000000030000000800010062706600500002000800040000000000050005004000f1ff3b00090000000000020000200000000000000084799c570b75daf6a86019aa0c141e0e4482535979cc9d862881eca80289160000001100000000000000001000"/131], 0x7c}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924924924923aa, 0x0) 11:49:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:40 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000000)) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:40 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa", 0x4}, r1}}, 0x38) syz_open_dev$sndtimer(&(0x7f0000001200)='/dev/snd/timer\x00', 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) recvmsg(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000001800)=@nfc, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001880)=""/76, 0x4c}, {&(0x7f0000001900)=""/204, 0xcc}, {&(0x7f0000001a00)=""/9, 0x9}], 0x3, &(0x7f0000001a80)=""/171, 0xab}, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000009140)={@ipv4={[], [], @remote}}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000dd40), &(0x7f000000dd80)=0x14) 11:49:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 11:49:40 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:41 executing program 4 (fault-call:3 fault-nth:0): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:41 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0x0, 0x1}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r2, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x370af8b0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x10, 0x4, 0x7ff}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1}}, 0x10) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:41 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 11:49:41 executing program 0 (fault-call:1 fault-nth:0): clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) [ 628.205326][T24432] FAULT_INJECTION: forcing a failure. [ 628.205326][T24432] name failslab, interval 1, probability 0, space 0, times 0 [ 628.234899][T24432] CPU: 0 PID: 24432 Comm: syz-executor.0 Not tainted 5.4.0-next-20191205-syzkaller #0 [ 628.244486][T24432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.254552][T24432] Call Trace: [ 628.257879][T24432] dump_stack+0x197/0x210 [ 628.262226][T24432] should_fail.cold+0xa/0x15 [ 628.266818][T24432] ? fault_create_debugfs_attr+0x180/0x180 [ 628.272718][T24432] ? ___might_sleep+0x163/0x2c0 [ 628.277580][T24432] __should_failslab+0x121/0x190 [ 628.282524][T24432] should_failslab+0x9/0x14 [ 628.287019][T24432] __kmalloc_track_caller+0x2dc/0x760 [ 628.292379][T24432] ? __check_object_size+0x3d/0x437 [ 628.297559][T24432] ? wait_for_completion+0x440/0x440 [ 628.302825][T24432] ? strndup_user+0x77/0xd0 [ 628.307311][T24432] memdup_user+0x26/0xd0 [ 628.311550][T24432] strndup_user+0x77/0xd0 [ 628.315970][T24432] __x64_sys_request_key+0x13b/0x430 [ 628.321243][T24432] ? __ia32_sys_add_key+0x4f0/0x4f0 [ 628.326424][T24432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.331867][T24432] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.337919][T24432] ? lockdep_hardirqs_on+0x421/0x5e0 [ 628.343187][T24432] ? trace_hardirqs_on+0x67/0x240 [ 628.348199][T24432] do_syscall_64+0xfa/0x790 [ 628.352693][T24432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.358576][T24432] RIP: 0033:0x45a679 [ 628.362457][T24432] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.382041][T24432] RSP: 002b:00007fa35cc5ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 628.390444][T24432] RAX: ffffffffffffffda RBX: 00007fa35cc5ac90 RCX: 000000000045a679 [ 628.398497][T24432] RDX: 0000000020000340 RSI: 0000000020000240 RDI: 0000000020000140 [ 628.406449][T24432] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 628.414401][T24432] R10: fffffffffffffffe R11: 0000000000000246 R12: 00007fa35cc5b6d4 [ 628.422355][T24432] R13: 00000000004c8d04 R14: 00000000004e0660 R15: 0000000000000003 11:49:41 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 11:49:41 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000000)={0x1, 0x73}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:41 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000040)=0x1000) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000000000)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0, 0x22a}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:41 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:41 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 11:49:42 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='#ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:42 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:42 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='%ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:42 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x60020, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000001200)={0x100000000, 0x0, 0x1, 0x80000000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000012c0)={r1, 0x5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:42 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='*ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:42 executing program 1: mkdir(&(0x7f0000000040)='.\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x33}, &(0x7f0000000080)=0x8) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e7305000000000000006f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000000140)=0x306848ec16c29208) 11:49:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 11:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001300)={0x1, 0xd1a, 0x7, 0x800, 0xffffffffffffffff}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000001780)={{0x2, 0x3, 0x493, 0x10000, 'syz1\x00', 0x1}, 0x0, [0x1000, 0x8, 0x100000000, 0x8, 0x7, 0x4, 0x7fffffff, 0x8, 0x4, 0x3, 0x0, 0xff, 0xd9, 0x9, 0xffffffffffffffff, 0x1000, 0xf5, 0x1f, 0x2, 0x1, 0x40, 0x800, 0x200, 0x2, 0xfffffffffffff9d9, 0x4950, 0x1, 0x8, 0x4, 0x2, 0xa2, 0xeb, 0x1f, 0xffffffff, 0x3ff, 0x7ff, 0x5, 0x100000000, 0x7, 0x7, 0x2, 0x4, 0x0, 0x20, 0xfffffffffffffffe, 0x9, 0xbb2, 0x0, 0x5, 0x8, 0x31, 0x80000001, 0x9, 0x5, 0x9, 0xfffffffffffffffb, 0x4, 0xfff, 0x1, 0x6, 0x5, 0x4, 0x6, 0x4, 0x5, 0x2, 0x5, 0x9, 0x7, 0x40, 0x5, 0x200, 0x21ab, 0x8001, 0x0, 0x6, 0x1, 0x6000000, 0x1f, 0x800, 0x7ff, 0x7, 0x5, 0xcc, 0x8, 0x2, 0x8, 0x1000, 0xba09, 0x5, 0x0, 0x100000001, 0x2, 0x100000001, 0x200, 0x1f, 0x9, 0x5, 0x7, 0x0, 0x4, 0x5, 0xfffffffffffffe01, 0x100000000, 0xffffffffffff8001, 0xffffffffffffff77, 0x1, 0x2, 0x40, 0x80000000, 0x8001, 0xad7b, 0x7, 0x0, 0xe074, 0x5, 0x100, 0x8, 0xffffffffffff28bb, 0x2, 0x6, 0x3f, 0x1, 0xfe, 0x1f, 0x3f, 0x6, 0x3], {0x0, 0x1c9c380}}) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r5 = accept$inet(r4, &(0x7f0000000040), &(0x7f0000001200)=0x10) ioctl$int_out(r5, 0x2a30, &(0x7f00000012c0)) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r6, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0, 0x3e1}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xfffffffffffffe8c}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={r7, r8+30000000}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:42 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='+ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x2) 11:49:42 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:42 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='-ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x3) 11:49:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe, {{0x0, 0x0, 0x0, 0x20000000, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, {0x0, 0x9}}}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:42 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:42 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r3 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000180)={0x75, 0x5, 0x9, 0x6, 0xffffff6e}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$midi(r5, &(0x7f0000000040)=""/39, 0x27) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r6, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/182, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0xfffffffffffffec9}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x224, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RLERROR(r8, &(0x7f0000000000)={0x14, 0x7, 0x1, {0xb, 'vboxnet0,.+'}}, 0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:43 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='.ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r3 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e22, 0x8, @loopback, 0xc2}}}, 0x90) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r4, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:43 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x4) 11:49:43 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='0ns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:43 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x15) r2 = socket(0x10, 0x2, 0x0) keyctl$join(0x1, &(0x7f0000000500)={'syz', 0x3}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) recvfrom(r2, &(0x7f0000000140)=""/189, 0xbd, 0x2120, &(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x7}, 0x80) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0x212, 0x0, 0x0, {{0x0, 0x0, 0xc8, 0xfffffffffffffffc, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}}}}, 0xa0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x102400, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0xffef) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r6 = socket(0x100000000011, 0x2, 0x0) sendmsg$nl_crypto(r3, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000880)={&(0x7f0000000640)=@getstat={0xe0, 0x15, 0x20, 0x70bd25, 0x25dfdbfd, {{'rfc7539esp(ecb-des3_ede-asm,blake2s-160-x86)\x00'}, [], [], 0x0, 0x800}, [""]}, 0xe0}, 0x1, 0x0, 0x0, 0x1000}, 0x14) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000540)={r8}) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) bind$xdp(r5, &(0x7f0000000900)={0x2c, 0x0, r9, 0x1d}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@gettclass={0x28, 0x2a, 0x800, 0x70bd26, 0x25dfdc00, {0x0, 0x0, 0x0, r9, {0x2, 0xffe0}, {0xc, 0x6}, {0xe, 0x1}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0xc080) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000300)='\x7f]\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r0, 0x1, 0x0, 0x0, {0xf}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) 11:49:43 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='Xns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:43 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x6, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0xa) 11:49:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x38, 0xfffffffffffffffe, 0x2, [{0x4, 0xffff, 0x9, 0x0, '\x89vmnet0.@'}]}, 0x38) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000000c0)=""/171, 0xab}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4083, 0xff3}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, 0x0, 0x0) 11:49:43 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='cns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:43 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xfffffffffffffc8a}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) open_by_handle_at(r4, &(0x7f0000000000)={0x9, 0x9, '}'}, 0x202) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0xe) 11:49:43 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x0, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:43 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ins_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:44 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000000)={0x8, 0x10001, 0x2}) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, 0x0, 0x0) 11:49:44 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='lns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:44 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x0, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0xf) 11:49:44 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0xffef) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r4, 0x1d}, 0x10) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, r4, 0x2}, 0xc) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r5 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000740)='\xcc@\xce\x1b.%\x90y\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00', 0xffffffffffffff4c) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r7, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000000680)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000000840)=[{&(0x7f0000000780)=""/184, 0xb8}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) r8 = socket(0x10, 0x2, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) recvmsg$kcm(r9, &(0x7f0000000640)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/11, 0xb}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f0000000440)=""/84, 0x54}], 0x3, &(0x7f0000000600)=""/4, 0x4}, 0x40000000) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) ioctl$SIOCAX25GETUID(r8, 0x89e0, &(0x7f0000000200)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r13}) 11:49:44 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ons_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:44 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0x0, 0x9, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:44 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='pns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:44 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c96ef15640cf8bc693f5ec9154a614f0400000000000000016598578744ec74540722a910af916429f33c047f88127d19a042b3e8f99ffba79e9ef678f641f1f7f4270ba9867067b74515bab0db5fc04e81ea03210a957dd4131b475a6825ed0234cd3da775ef1ed78ae41338346c4aa5691432b91d910f931ccfff722c1105e34a5ab6cef9fa139808c2996e5f75faaed77d8a8a7bc8b518265c9b7160f8dd5005f1fb252329a6ce14d9bbb713c5c9fc3c9a9b518e8770f6b6329ba520b9afacab10baa883ea9b4aa53544e405d58522656241b2607a44f73ec98905f804baaabad2e0182e8011f8a8fd85b8bbe2795e32baaf5b6965ccddc8a1f13763f41e017904fc47ee5f46ac9a33ea0956b71e1f6c156545"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x6f, 0x4) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0xba) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) mknod$loop(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) 11:49:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x60) 11:49:44 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='sns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, 0x0, 0x0) 11:49:44 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x0, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:44 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='uns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:45 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x0, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {0x17}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0xf0) 11:49:45 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001140)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {&(0x7f0000001100), 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r1}}, 0x38) syz_open_dev$sndtimer(0x0, 0x0, 0x141400) r2 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000001280)={{0x0, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000001700)={0x0, 0x1000}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r3, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, 0x0, 0x120) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000002f00)=""/174, 0xae}, {0x0}, {0x0}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}], 0x7, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000065c0)=""/16, 0x10}, {0x0}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x5, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{0x0}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00), 0x0, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {0x0}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x5}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x68b02, 0x0) ioctl$sock_inet_SIOCRTMSG(r6, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e20, @multicast2}, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x100, 0x3}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f0000009180)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, &(0x7f000000dd80)) 11:49:45 executing program 0: clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='xns_resolver\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000340)='trusted.overlay.origin\x00', 0xfffffffffffffffe) 11:49:45 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x80000001, 0xfff, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001140)={0xffffffffffffffff}, 0x31d, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000011c0)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e20, 0x9, @rand_addr="60ed10b3d99a89a0ce9cb234924636fa"}, r3}}, 0x38) r4 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000001240)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001280)={{0x4, 0x0, @identifier="ea7b29371ea814d68d4e1ef1c3c4922d"}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x0, &(0x7f00000012c0)=0xa7d, 0x4) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) accept4$alg(r6, 0x0, 0x0, 0x41800) syz_open_dev$sndtimer(&(0x7f0000001340)='/dev/snd/timer\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001380)=@known='security.apparmor\x00', &(0x7f00000013c0)=""/37, 0x25) r7 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video36\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001440)={0x7, 0x2, 0x589b42b5df44a47e, 0x0, 0x7, [{0x3f, 0x100000000, 0x1, 0x0, 0x0, 0x5c2}, {0x7ef803df, 0x8, 0x4, 0x0, 0x0, 0x804}, {0x7ff, 0xb9, 0xfffffffffffffffb}, {0xffffffffffffffba, 0x0, 0x862, 0x0, 0x0, 0x304}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x2200}, {0x0, 0x10000, 0x100000001, 0x0, 0x0, 0x2}, {0x0, 0x798, 0x0, 0x0, 0x0, 0x1000}]}) r8 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001640), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r8, 0x110, 0x2, &(0x7f0000001680)='security.apparmor\x00', 0x12) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000001700)={0x6000, 0x1000}) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RAUTH(r10, &(0x7f0000001780)={0x14, 0x67, 0x2, {0x8, 0x1, 0x7}}, 0x14) getpgrp(0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80)='/dev/vcsu\x00', 0x2032c0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001c00)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000001c40)=@xdp, &(0x7f0000001cc0)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005300)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/174, 0xae}, {&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/161, 0xa1}, {&(0x7f0000003100)=""/132, 0x84}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/137, 0x89}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/12, 0xc}, {&(0x7f00000052c0)=""/9, 0x9}], 0xa, &(0x7f00000053c0)=""/162, 0xa2}, 0x1}, {{&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000007680)=[{&(0x7f0000005500)=""/192, 0xc0}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/16, 0x10}, {&(0x7f0000006600)=""/35, 0x23}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/58, 0x3a}], 0x6, &(0x7f0000007700)=""/102, 0x66}, 0xff}, {{&(0x7f0000007780)=@isdn, 0x80, &(0x7f0000007980)=[{&(0x7f0000007800)=""/200, 0xc8}, {&(0x7f0000007900)=""/83, 0x53}], 0x2}, 0x10001}, {{&(0x7f00000079c0)=@hci, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)=""/167, 0xa7}], 0x1, &(0x7f0000007b40)=""/130, 0x82}, 0x1}, {{&(0x7f0000007c00)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000008f40)=[{&(0x7f0000007c80)=""/4096, 0x1000}, {&(0x7f0000008c80)=""/58, 0x3a}, {&(0x7f0000008cc0)=""/135, 0x87}, {&(0x7f0000008d80)=""/180, 0xb4}, {&(0x7f0000008e40)=""/15, 0xf}, {&(0x7f0000008e80)=""/173, 0xad}], 0x6}, 0x20}], 0x5, 0x2, &(0x7f0000009100)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dac0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000db00)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f000000dc00)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000dc40)={'vxcan1\x00'}) 11:49:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 776.541469][ T1122] INFO: task syz-executor.1:24714 can't die for more than 143 seconds. [ 776.549793][ T1122] syz-executor.1 D28520 24714 9100 0x00000004 [ 776.556474][ T1122] Call Trace: [ 776.559960][ T1122] __schedule+0x934/0x1f90 [ 776.564461][ T1122] ? __sched_text_start+0x8/0x8 [ 776.569314][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 776.574588][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 776.579994][ T1122] ? lockdep_hardirqs_on+0x421/0x5e0 [ 776.585411][ T1122] schedule+0xdc/0x2b0 [ 776.589497][ T1122] rwsem_down_write_slowpath+0x706/0xf80 [ 776.595195][ T1122] ? up_write+0x490/0x490 [ 776.599521][ T1122] ? mark_held_locks+0xf0/0xf0 [ 776.604363][ T1122] ? lock_acquire+0x190/0x410 [ 776.609046][ T1122] ? filename_create+0x17c/0x4f0 [ 776.614033][ T1122] down_write_nested+0x140/0x160 [ 776.618983][ T1122] ? down_write_nested+0x140/0x160 [ 776.624153][ T1122] ? _down_write_nest_lock+0x150/0x150 [ 776.629607][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.635897][ T1122] ? __mnt_want_write+0x1f1/0x2f0 [ 776.642864][ T1122] filename_create+0x17c/0x4f0 [ 776.647631][ T1122] ? kern_path_mountpoint+0x40/0x40 [ 776.652901][ T1122] ? strncpy_from_user+0x2b4/0x400 [ 776.658028][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.664331][ T1122] ? getname_flags+0x277/0x5b0 [ 776.669117][ T1122] do_mknodat+0x1a4/0x480 [ 776.673548][ T1122] ? do_file_open_root+0x3a0/0x3a0 [ 776.678675][ T1122] ? do_syscall_64+0x26/0x790 [ 776.683417][ T1122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.689507][ T1122] ? do_syscall_64+0x26/0x790 [ 776.694257][ T1122] __x64_sys_mknod+0x7b/0xb0 [ 776.698855][ T1122] do_syscall_64+0xfa/0x790 [ 776.703432][ T1122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.709335][ T1122] RIP: 0033:0x45a679 [ 776.713336][ T1122] Code: f3 a4 48 8b 94 24 18 10 00 00 ff 12 48 8b 94 24 10 10 00 00 48 8b bc 24 20 10 00 00 8b 8c 24 28 10 00 00 8b 9c 24 2c 10 00 00 <48> 89 e6 48 01 df 48 01 de 48 29 d9 e8 c6 fa ff ff 48 8b ac 24 00 [ 776.732992][ T1122] RSP: 002b:00007f9b548fec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 776.741472][ T1122] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 776.749448][ T1122] RDX: 0000000000000702 RSI: 0000000000000000 RDI: 00000000200004c0 [ 776.758641][ T1122] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 776.766681][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b548ff6d4 [ 776.774835][ T1122] R13: 00000000004c7838 R14: 00000000004de530 R15: 00000000ffffffff [ 776.783483][ T1122] INFO: task syz-executor.1:24714 blocked for more than 143 seconds. [ 776.791648][ T1122] Not tainted 5.4.0-next-20191205-syzkaller #0 [ 776.798326][ T1122] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 776.807046][ T1122] syz-executor.1 D28520 24714 9100 0x00000004 [ 776.813441][ T1122] Call Trace: [ 776.816722][ T1122] __schedule+0x934/0x1f90 [ 776.821195][ T1122] ? __sched_text_start+0x8/0x8 [ 776.826061][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 776.831345][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 776.836543][ T1122] ? lockdep_hardirqs_on+0x421/0x5e0 [ 776.841887][ T1122] schedule+0xdc/0x2b0 [ 776.845960][ T1122] rwsem_down_write_slowpath+0x706/0xf80 [ 776.851670][ T1122] ? up_write+0x490/0x490 [ 776.856010][ T1122] ? mark_held_locks+0xf0/0xf0 [ 776.860776][ T1122] ? lock_acquire+0x190/0x410 [ 776.866603][ T1122] ? filename_create+0x17c/0x4f0 [ 776.871956][ T1122] down_write_nested+0x140/0x160 [ 776.876897][ T1122] ? down_write_nested+0x140/0x160 [ 776.882072][ T1122] ? _down_write_nest_lock+0x150/0x150 [ 776.887551][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.893862][ T1122] ? __mnt_want_write+0x1f1/0x2f0 [ 776.898896][ T1122] filename_create+0x17c/0x4f0 [ 776.903710][ T1122] ? kern_path_mountpoint+0x40/0x40 [ 776.909007][ T1122] ? strncpy_from_user+0x2b4/0x400 [ 776.914358][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.920606][ T1122] ? getname_flags+0x277/0x5b0 [ 776.925492][ T1122] do_mknodat+0x1a4/0x480 [ 776.929838][ T1122] ? do_file_open_root+0x3a0/0x3a0 [ 776.935008][ T1122] ? do_syscall_64+0x26/0x790 [ 776.939729][ T1122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.945850][ T1122] ? do_syscall_64+0x26/0x790 [ 776.950609][ T1122] __x64_sys_mknod+0x7b/0xb0 [ 776.955254][ T1122] do_syscall_64+0xfa/0x790 [ 776.959780][ T1122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.965879][ T1122] RIP: 0033:0x45a679 [ 776.969771][ T1122] Code: f3 a4 48 8b 94 24 18 10 00 00 ff 12 48 8b 94 24 10 10 00 00 48 8b bc 24 20 10 00 00 8b 8c 24 28 10 00 00 8b 9c 24 2c 10 00 00 <48> 89 e6 48 01 df 48 01 de 48 29 d9 e8 c6 fa ff ff 48 8b ac 24 00 [ 776.990647][ T1122] RSP: 002b:00007f9b548fec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 776.999297][ T1122] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 777.007482][ T1122] RDX: 0000000000000702 RSI: 0000000000000000 RDI: 00000000200004c0 [ 777.015539][ T1122] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 777.023599][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b548ff6d4 [ 777.031652][ T1122] R13: 00000000004c7838 R14: 00000000004de530 R15: 00000000ffffffff [ 777.039678][ T1122] INFO: task syz-executor.1:24715 can't die for more than 143 seconds. [ 777.048002][ T1122] syz-executor.1 D28184 24715 9100 0x00004004 [ 777.054369][ T1122] Call Trace: [ 777.057659][ T1122] __schedule+0x934/0x1f90 [ 777.062138][ T1122] ? __sched_text_start+0x8/0x8 [ 777.066992][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 777.072234][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 777.077442][ T1122] ? lockdep_hardirqs_on+0x421/0x5e0 [ 777.082809][ T1122] schedule+0xdc/0x2b0 [ 777.086890][ T1122] rwsem_down_write_slowpath+0x706/0xf80 [ 777.094134][ T1122] ? up_write+0x490/0x490 [ 777.098472][ T1122] ? mark_held_locks+0xf0/0xf0 [ 777.103311][ T1122] ? __kasan_check_read+0x11/0x20 [ 777.108333][ T1122] ? lock_acquire+0x190/0x410 [ 777.113054][ T1122] ? lock_mount+0x8c/0x2e0 [ 777.117475][ T1122] down_write+0x13c/0x150 [ 777.121872][ T1122] ? down_write+0x13c/0x150 [ 777.126383][ T1122] ? __down_timeout+0x2d0/0x2d0 [ 777.131293][ T1122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 777.137017][ T1122] ? mnt_warn_timestamp_expiry+0x127/0x300 [ 777.142896][ T1122] lock_mount+0x8c/0x2e0 [ 777.147141][ T1122] do_add_mount+0x27/0x380 [ 777.151633][ T1122] do_mount+0x1701/0x1b50 [ 777.156169][ T1122] ? copy_mount_string+0x40/0x40 [ 777.161182][ T1122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.167517][ T1122] ? _copy_from_user+0x12c/0x1a0 [ 777.172748][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.179004][ T1122] ? copy_mount_options+0x2e8/0x3f0 [ 777.184399][ T1122] ksys_mount+0xdb/0x150 [ 777.188691][ T1122] __x64_sys_mount+0xbe/0x150 [ 777.193571][ T1122] do_syscall_64+0xfa/0x790 [ 777.198088][ T1122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.205057][ T1122] RIP: 0033:0x45a679 [ 777.208949][ T1122] Code: f3 a4 48 8b 94 24 18 10 00 00 ff 12 48 8b 94 24 10 10 00 00 48 8b bc 24 20 10 00 00 8b 8c 24 28 10 00 00 8b 9c 24 2c 10 00 00 <48> 89 e6 48 01 df 48 01 de 48 29 d9 e8 c6 fa ff ff 48 8b ac 24 00 [ 777.228874][ T1122] RSP: 002b:00007f9b548ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 777.237462][ T1122] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a679 [ 777.245611][ T1122] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 777.253736][ T1122] RBP: 000000000075c070 R08: 00000000200005c0 R09: 0000000000000000 [ 777.262098][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b548de6d4 [ 777.270119][ T1122] R13: 00000000004c7981 R14: 00000000004de788 R15: 00000000ffffffff [ 777.278163][ T1122] INFO: task syz-executor.1:24715 blocked for more than 144 seconds. [ 777.287060][ T1122] Not tainted 5.4.0-next-20191205-syzkaller #0 [ 777.293768][ T1122] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 777.302492][ T1122] syz-executor.1 D28184 24715 9100 0x00004004 [ 777.308923][ T1122] Call Trace: [ 777.313773][ T1122] __schedule+0x934/0x1f90 [ 777.318212][ T1122] ? __sched_text_start+0x8/0x8 [ 777.323141][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 777.328453][ T1122] ? _raw_spin_unlock_irq+0x23/0x80 [ 777.333742][ T1122] ? lockdep_hardirqs_on+0x421/0x5e0 [ 777.339050][ T1122] schedule+0xdc/0x2b0 [ 777.343247][ T1122] rwsem_down_write_slowpath+0x706/0xf80 [ 777.348895][ T1122] ? up_write+0x490/0x490 [ 777.353485][ T1122] ? mark_held_locks+0xf0/0xf0 [ 777.358254][ T1122] ? __kasan_check_read+0x11/0x20 [ 777.363363][ T1122] ? lock_acquire+0x190/0x410 [ 777.368033][ T1122] ? lock_mount+0x8c/0x2e0 [ 777.372515][ T1122] down_write+0x13c/0x150 [ 777.376842][ T1122] ? down_write+0x13c/0x150 [ 777.381659][ T1122] ? __down_timeout+0x2d0/0x2d0 [ 777.386571][ T1122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 777.392349][ T1122] ? mnt_warn_timestamp_expiry+0x127/0x300 [ 777.398260][ T1122] lock_mount+0x8c/0x2e0 [ 777.402638][ T1122] do_add_mount+0x27/0x380 [ 777.407071][ T1122] do_mount+0x1701/0x1b50 [ 777.411619][ T1122] ? copy_mount_string+0x40/0x40 [ 777.416629][ T1122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.424529][ T1122] ? _copy_from_user+0x12c/0x1a0 [ 777.429486][ T1122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.435779][ T1122] ? copy_mount_options+0x2e8/0x3f0 [ 777.441080][ T1122] ksys_mount+0xdb/0x150 [ 777.445349][ T1122] __x64_sys_mount+0xbe/0x150 [ 777.450040][ T1122] do_syscall_64+0xfa/0x790 [ 777.454636][ T1122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.460539][ T1122] RIP: 0033:0x45a679 [ 777.464533][ T1122] Code: f3 a4 48 8b 94 24 18 10 00 00 ff 12 48 8b 94 24 10 10 00 00 48 8b bc 24 20 10 00 00 8b 8c 24 28 10 00 00 8b 9c 24 2c 10 00 00 <48> 89 e6 48 01 df 48 01 de 48 29 d9 e8 c6 fa ff ff 48 8b ac 24 00 [ 777.484203][ T1122] RSP: 002b:00007f9b548ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 777.492675][ T1122] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a679 [ 777.500644][ T1122] RDX: 0000000020000300 RSI: 0000000020000200 RDI: 0000000000000000 [ 777.508747][ T1122] RBP: 000000000075c070 R08: 00000000200005c0 R09: 0000000000000000 [ 777.516793][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b548de6d4 [ 777.524832][ T1122] R13: 00000000004c7981 R14: 00000000004de788 R15: 00000000ffffffff [ 777.534450][ T1122] [ 777.534450][ T1122] Showing all locks held in the system: [ 777.542266][ T1122] 3 locks held by kworker/u4:0/7: [ 777.547284][ T1122] #0: ffff8880ae937358 (&rq->lock){-.-.}, at: newidle_balance+0xa28/0xe80 [ 777.555929][ T1122] #1: ffffffff899ae4c0 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 777.565099][ T1122] #2: ffff8880ae927258 (&base->lock){-.-.}, at: lock_timer_base+0x56/0x1b0 [ 777.573900][ T1122] 1 lock held by khungtaskd/1122: [ 777.578923][ T1122] #0: ffffffff899ae4c0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 777.588495][ T1122] 2 locks held by getty/9056: [ 777.593317][ T1122] #0: ffff88809169c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.602317][ T1122] #1: ffffc9000171b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.612004][ T1122] 2 locks held by getty/9057: [ 777.616665][ T1122] #0: ffff888095efb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.625650][ T1122] #1: ffffc9000172b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.635254][ T1122] 2 locks held by getty/9058: [ 777.639904][ T1122] #0: ffff8880a4905090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.650007][ T1122] #1: ffffc900017ab2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.659635][ T1122] 2 locks held by getty/9059: [ 777.664346][ T1122] #0: ffff88809edd8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.673359][ T1122] #1: ffffc9000177b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.683023][ T1122] 2 locks held by getty/9060: [ 777.687688][ T1122] #0: ffff8880a7d42090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.696679][ T1122] #1: ffffc9000178b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.706292][ T1122] 2 locks held by getty/9061: [ 777.710944][ T1122] #0: ffff88809569f090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.719964][ T1122] #1: ffffc9000179b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.729585][ T1122] 2 locks held by getty/9062: [ 777.734286][ T1122] #0: ffff8880a0e9a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 777.743387][ T1122] #1: ffffc900016f32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 777.754202][ T1122] 2 locks held by syz-executor.1/24687: [ 777.759756][ T1122] #0: ffff8880a8efe428 (sb_writers#13){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 777.768495][ T1122] #1: ffff888093b55728 (&sb->s_type->i_mutex_key#21/1){+.+.}, at: filename_create+0x17c/0x4f0 [ 777.778896][ T1122] 2 locks held by syz-executor.1/24714: [ 777.784517][ T1122] #0: ffff8880a8efe428 (sb_writers#13){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 777.793275][ T1122] #1: ffff888093b55728 (&sb->s_type->i_mutex_key#21/1){+.+.}, at: filename_create+0x17c/0x4f0 [ 777.803866][ T1122] 1 lock held by syz-executor.1/24715: [ 777.809425][ T1122] #0: ffff888093b55728 (&sb->s_type->i_mutex_key#22){++++}, at: lock_mount+0x8c/0x2e0 [ 777.819131][ T1122] [ 777.822091][ T1122] ============================================= [ 777.822091][ T1122] [ 777.830505][ T1122] NMI backtrace for cpu 0 [ 777.834923][ T1122] CPU: 0 PID: 1122 Comm: khungtaskd Not tainted 5.4.0-next-20191205-syzkaller #0 [ 777.844021][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.854063][ T1122] Call Trace: [ 777.857343][ T1122] dump_stack+0x197/0x210 [ 777.861658][ T1122] nmi_cpu_backtrace.cold+0x70/0xb2 [ 777.866889][ T1122] ? vprintk_func+0x86/0x189 [ 777.871510][ T1122] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 777.877123][ T1122] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 777.883097][ T1122] arch_trigger_cpumask_backtrace+0x14/0x20 [ 777.888977][ T1122] watchdog+0xdf1/0x14e0 [ 777.893246][ T1122] kthread+0x361/0x430 [ 777.897293][ T1122] ? reset_hung_task_detector+0x30/0x30 [ 777.902858][ T1122] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 777.908561][ T1122] ret_from_fork+0x24/0x30 [ 777.913113][ T1122] Sending NMI from CPU 0 to CPUs 1: [ 777.918475][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 777.920834][ T1122] Kernel panic - not syncing: hung_task: blocked tasks [ 777.933580][ T1122] CPU: 0 PID: 1122 Comm: khungtaskd Not tainted 5.4.0-next-20191205-syzkaller #0 [ 777.942839][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.952873][ T1122] Call Trace: [ 777.956149][ T1122] dump_stack+0x197/0x210 [ 777.960520][ T1122] panic+0x2e3/0x75c [ 777.964417][ T1122] ? add_taint.cold+0x16/0x16 [ 777.969091][ T1122] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 777.974841][ T1122] ? ___preempt_schedule+0x16/0x18 [ 777.979954][ T1122] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 777.986092][ T1122] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 777.992221][ T1122] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 777.998356][ T1122] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 778.004512][ T1122] watchdog+0xe02/0x14e0 [ 778.008820][ T1122] kthread+0x361/0x430 [ 778.012878][ T1122] ? reset_hung_task_detector+0x30/0x30 [ 778.018404][ T1122] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 778.024110][ T1122] ret_from_fork+0x24/0x30 [ 778.030309][ T1122] Kernel Offset: disabled [ 778.034919][ T1122] Rebooting in 86400 seconds..