010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:54 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() r3 = getuid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x4, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xc16}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x80}}], [{@fowner_eq={'fowner', 0x3d, r3}}]}}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) 06:15:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:54 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400104, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) socketpair(0xa, 0x4, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560384470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 06:15:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:54 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:54 executing program 5: r0 = socket(0xf, 0x7, 0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x10a00, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x5) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3, 0x0, 0x5, 0xffff}]}) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f00000003c0)=0x3, 0x4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000100)={@sco, {0x0}, 0x0}, 0xa0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac000000020b2d002dbd7000fbdbdf250100000108002200", @ANYRES32=r2, @ANYBLOB="fa103bb8b56b8b4553476df24ca33e174d6663a340ef2863e2bebc153063e74c1c5b6a4c18cef961d4b637c25b8056d037763d51992042aad18bc642baef8d3e064299f2684ad65e939c09d87c2964d9513dfc560c51fbc81770d606a029897a205611eaf7f6d30e9e24b6b34fbe66377e16949a0c906cce27b20a5bb909e709c15793d07bc51c6e404cb1bd944ef5a2"], 0xac}, 0x1, 0x0, 0x0, 0x90}, 0x4004041) 06:15:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x5, 0x4, 0x20000000000005, 0x0, 0x0}, 0x2c) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8080, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r2, 0x900, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x37, 0x8}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x40040) bpf$MAP_CREATE(0x2, &(0x7f0000000240)={0x17, 0x0, 0x77fffe, 0x0, 0x820001, r0, 0x4}, 0x1b) 06:15:54 executing program 2: r0 = socket$unix(0x1, 0x40000000000007fb, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) setgid(0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) listen(r0, 0x0) setresgid(0x0, 0x0, 0x0) listen(r0, 0x0) accept(r0, &(0x7f0000000140)=@rc, &(0x7f0000000000)=0x80) 06:15:54 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000600)={{}, {0x1, 0x2}, [{0x2, 0x5, r2}, {0x2, 0x5, r3}, {0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x1, r7}, {0x2, 0x2, r8}], {0x4, 0x4}, [{0x8, 0x4, r9}, {0x8, 0x0, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0x6c, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 06:15:54 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:55 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x7fe) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000200)=ANY=[], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="ff00000000000000"]], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x2910, r0, 0x0) 06:15:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:55 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x81, 0x8b) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000300)={0x12, 0x10, 0xfa00, {&(0x7f0000000240), r2, r1}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x70, "cc35381d5130cd39321b66c30ee7266dd441ba0862ad5b010f72f4ef0855ac539e4a0b7e14996fdc308436fe778a2508055fe205fd1be09d440b9a22a6bd2e6979afcabd2492e7800195ae2a6cf2b23fcddbf67ab25a062a51380863392c2c9c71dd4f61e7d5dbb2b9a54b76f4df03cf"}, &(0x7f0000000040)=0x78) accept(r0, &(0x7f0000000400)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000480)=0x80) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000004c0)={@loopback, @rand_addr="5f67a1774e4cf53ed630b6af097a233d", @empty, 0x5, 0x7f, 0x80000001, 0x100, 0x80, 0x100, r4}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e22, 0x1, @empty, 0xffffffffffffffff}}, 0x1ff, 0xd431, 0x2, 0x200, 0xffffffffffff8000}, &(0x7f0000000200)=0x98) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) 06:15:55 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x103000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x3ff, 0x7, 0x1, 0x1ff, 0x0}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000200)=r3, 0x4) renameat2(r2, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 06:15:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000180)=0x2, 0x2) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0xba) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) munmap(&(0x7f0000365000/0x3000)=nil, 0x3000) io_submit(r3, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x20000, 0x40000000, 0xf0000000000000, 0x0, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) r4 = semget(0x0, 0x2, 0x10) semctl$GETPID(r4, 0x3, 0xb, &(0x7f0000000200)=""/197) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000001c0)={0x2}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 06:15:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:55 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000600)={{}, {0x1, 0x2}, [{0x2, 0x5, r2}, {0x2, 0x5, r3}, {0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x1, r7}, {0x2, 0x2, r8}], {0x4, 0x4}, [{0x8, 0x4, r9}, {0x8, 0x0, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0x6c, 0x1) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 06:15:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:55 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x80400) read$eventfd(r1, &(0x7f0000000180), 0x8) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000080)=""/217) 06:15:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:56 executing program 1: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x3ac58735f81a6386, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0xeffdffff, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 06:15:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:56 executing program 2: clone(0x400002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000002, 0x0) r0 = gettid() tgkill(r0, r0, 0x13) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x4, 0x0, 0x10001, 0x7, 0xffffffffffffffe1, 0x1}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x246400, 0x80) 06:15:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:56 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) read$eventfd(0xffffffffffffffff, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r2, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x6, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) keyctl$setperm(0x5, r2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000300)={0x2, 0x100, 0x1, {0x10001, 0x7, 0x4, 0x100000001}}) fstat(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x0, r5) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000800), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000980)=ANY=[@ANYBLOB="1b0b21e200000080000000007a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6921f2c1413a3ce08f4f69ac175826de7c7221d003e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c9cf886284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c56648000000ca5cbbe5ce7afae1fb5032afc4691072a12022b7898e86c3ce1d958624d814825835fe71938502d9f2a53a990c88d155bbb0495d57e38ea791066e0200000000000000660ee49897bb04b702e0dbadac82466afe2da42a4ab5eb82bf2dfd31a7bf", @ANYRES32], 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000005c0)=0x40, 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x2801, 0x0) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000003c0)=0xffffffffffffff71) mount(&(0x7f00000008c0)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR], @ANYRESDEC, @ANYRES32=r7, @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESDEC=r6], @ANYRES16=r0, @ANYRESDEC=r8, @ANYRES32=r3], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x601, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x3, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000002c0)={'nat\x00', 0x0, 0x3, 0xf, [], 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f0000000280)=""/15}, &(0x7f0000000340)=0x78) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@mcast1, @initdev, @mcast1}) preadv(r1, &(0x7f00000017c0), 0x324, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x20, 0x1, 0x2, 0x1, r1, 0x7}, 0x2c) write$P9_RLINK(r2, &(0x7f0000000100)={0x7, 0x47, 0xa}, 0x7) 06:15:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0xfffffded) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f00000000c0)=0x1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000180)=0xffff) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000080)=0x6) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:15:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) fcntl$getflags(r0, 0xb) mknodat(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x8}, 0x0, 0x0) 06:15:57 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) read$eventfd(0xffffffffffffffff, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r2, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x6, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) keyctl$setperm(0x5, r2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000300)={0x2, 0x100, 0x1, {0x10001, 0x7, 0x4, 0x100000001}}) fstat(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x0, r5) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000800), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000980)=ANY=[@ANYBLOB="1b0b21e200000080000000007a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6921f2c1413a3ce08f4f69ac175826de7c7221d003e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c9cf886284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c56648000000ca5cbbe5ce7afae1fb5032afc4691072a12022b7898e86c3ce1d958624d814825835fe71938502d9f2a53a990c88d155bbb0495d57e38ea791066e0200000000000000660ee49897bb04b702e0dbadac82466afe2da42a4ab5eb82bf2dfd31a7bf", @ANYRES32], 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000005c0)=0x40, 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x2801, 0x0) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000003c0)=0xffffffffffffff71) mount(&(0x7f00000008c0)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR], @ANYRESDEC, @ANYRES32=r7, @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESDEC=r6], @ANYRES16=r0, @ANYRESDEC=r8, @ANYRES32=r3], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) read$eventfd(0xffffffffffffffff, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r2, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x6, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) keyctl$setperm(0x5, r2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000300)={0x2, 0x100, 0x1, {0x10001, 0x7, 0x4, 0x100000001}}) fstat(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x0, r5) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000800), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000980)=ANY=[@ANYBLOB="1b0b21e200000080000000007a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6921f2c1413a3ce08f4f69ac175826de7c7221d003e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c9cf886284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c56648000000ca5cbbe5ce7afae1fb5032afc4691072a12022b7898e86c3ce1d958624d814825835fe71938502d9f2a53a990c88d155bbb0495d57e38ea791066e0200000000000000660ee49897bb04b702e0dbadac82466afe2da42a4ab5eb82bf2dfd31a7bf", @ANYRES32], 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000005c0)=0x40, 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x2801, 0x0) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000003c0)=0xffffffffffffff71) mount(&(0x7f00000008c0)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR], @ANYRESDEC, @ANYRES32=r7, @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESDEC=r6], @ANYRES16=r0, @ANYRESDEC=r8, @ANYRES32=r3], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600000000000a00000000000000000000997f6699000000000000d6dbb905d1f86beb0000000d000800e0020000b89c0fa2997da12ba71996d8ee000000809ac1ec3d95c9a0af6fa7fe171ac34721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b733890eb3db522d9e73a871a86cc8c8dda870000000002000100000000000000030080ffffff05000500000000000a000000def7bd3e10c05ce000000000fe800000200000003692daa992ee1466"], 0xd8}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0xc2ff, 0x2}) r1 = socket$key(0xf, 0x3, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x400, 0x0, 0x10000, 0x3}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f00000000c0)={r2}) sendmmsg(r1, &(0x7f0000000180), 0x400024c, 0x0) 06:15:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:57 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) read$eventfd(0xffffffffffffffff, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r2, 0x0, 0x0) modify_ldt$read(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000015c0)=""/90, 0x5a}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x6, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40a01, 0x0) keyctl$setperm(0x5, r2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f0000000300)={0x2, 0x100, 0x1, {0x10001, 0x7, 0x4, 0x100000001}}) fstat(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x0, r5) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000800), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000980)=ANY=[@ANYBLOB="1b0b21e200000080000000007a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6921f2c1413a3ce08f4f69ac175826de7c7221d003e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c9cf886284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c56648000000ca5cbbe5ce7afae1fb5032afc4691072a12022b7898e86c3ce1d958624d814825835fe71938502d9f2a53a990c88d155bbb0495d57e38ea791066e0200000000000000660ee49897bb04b702e0dbadac82466afe2da42a4ab5eb82bf2dfd31a7bf", @ANYRES32], 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000005c0)=0x40, 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r7 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x2801, 0x0) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000003c0)=0xffffffffffffff71) mount(&(0x7f00000008c0)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR], @ANYRESDEC, @ANYRES32=r7, @ANYPTR64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESDEC=r6], @ANYRES16=r0, @ANYRESDEC=r8, @ANYRES32=r3], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw6\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/72, 0x58}], 0x10, 0xa3) 06:15:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:57 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7f, 0x40800) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80040, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000000c0)={0x2, 0x1, 0x100000001, 0x8, 0xfffffffffffffffc, 0x800}) r2 = accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bind(r1, &(0x7f0000000180)=@can={0x1d, r3}, 0x80) setns(r0, 0x30020000) write$9p(r2, &(0x7f0000000200)="fd5180e8d78d821cefd958a14be396e6c813dbfe272a5d8d9b18e2551d9bc60af1ca59", 0x23) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000240)="4d2eb201e01d1055f12ee91bde64615ce6caeefdc13af9862b25a05937105aedf99c3864cd20c1d385d9b19b9d1b4a034c30e46621cbef7a209b550f8e6139587c4637a1e527", 0x46}, {&(0x7f00000002c0)="6d45fce602b060bca7", 0x9}, {&(0x7f0000000300)="90ae145145eb71cc", 0x8}, {&(0x7f0000000340)="e356e59ee63ec733db033e2a12ec781820caee14780ba99e3ce4dca40bef114b81482090188d85c99c7ac552b63fa31d5cdea8c9a4b527a53d63dd5325e5b754635028d1f6d0", 0x46}, {&(0x7f00000003c0)="70dbd4b7dbebca2f0d9f6c07d46f92f96be2e986eaf151989010242dd0a64f401dc22c231dce02dcf6b524fc3d6947ab2c3ee1347bf87e51588fa980ec34e458a37aefb0eb4060eee9a20117b77183a9801fecd927c57d0702fcd0bda501e477b0bdda5e1c9ed1e92bc43b7a053d5ebf63206bb41873c63e8a81415445de5e3a7ac18c59c9f90720385654f40806a0bdfdb41f6ca602a9e6264bcf092faa8d1608077d755bfb0d0454d51ca9d7dfaf0389dacc0fe201a57207afa00917c6f3b2da6ac285ad6c409c4b262952df6119647111112e3575be9f57996139ae29a73b16", 0xe1}, {&(0x7f00000004c0)="19a842817560a93cd00eacc6e798fd5f87c30cfb79df5dbd79485629aef30fe0b331fcc140dd71c203a7c565053f3bd8bd64c21831efc1543281b38d0591634494245d25a69a8d360968d767b02a8183be8e0884628e46ec39d955d6b25ce4c25927999da82b239cc8759925cbee14a0a846263499719d3923f3148f22e36ef50918bf8f15323af088f1905ddb83bca84e079cf5e60b6937e81a6603d528b03859d096c3900a6918e2c7fb4d14d362d73c60e0d03314547b1f65933bd5e0093d076c0c9ab18068515b68f61f", 0xcc}, {&(0x7f00000005c0)="80d0a2493cb755b539ba2cd0deeca5b931713ee76f600470da039df2195334a2d2df9a66dcd4b0f34914b3e6f2160caf2d7938c2ef84bebb2c28294942902627", 0x40}, {&(0x7f0000000600)="2488b91645d0eb1718190ce47f0010e780b407d5e7ed6b8e999c151fc0bdaefa1453a7dec4af893783c9a430522750d6848c064567ccfed1bd986aa99d5356dfa5a54536b21abcd304522d03e1c026dceae72d2b32fb13df17b9b30681c979ae8ae9c67a21f45a9e570901a0a6ef8c7275", 0x71}], 0x8}, 0x1) getxattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='trusted.overlay.redirect\x00', &(0x7f00000007c0)=""/91, 0x5b) r4 = syz_open_dev$adsp(&(0x7f0000000840)='/dev/adsp#\x00', 0x1, 0x200) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000880)={r1, 0x5, 0x7ff, "3a8a564dc6209fc803834e189d4fc973352c0beda20e135ac1b9310384740e97813e0e523fe0a7dc3e8f5d1fa28b7400f3d0bb7718ec34fe585ad1a5377d71f0a159b6b961d76ddadf8e6bcce7bb9e3229a5fb"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') r5 = syz_open_dev$dmmidi(&(0x7f0000000940)='/dev/dmmidi#\x00', 0x2f8, 0x40) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000980)=0x7fffffff, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x4058534c, &(0x7f00000009c0)={0x8000, 0x7, 0x80000001, 0xc78c, 0x2, 0x2}) r6 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000b00)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80)={'syz', 0x2}, 0x0, 0x0, r6) ioctl$KIOCSOUND(r1, 0x4b2f, 0xb6) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000b80)={0xa30000, 0x0, 0x7fff, [], &(0x7f0000000b40)={0x9c090c, 0x40, [], @value64=0x7}}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000bc0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000000c00)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000c40)={{0x3, 0x1, 0x8, 0x3, 0x5}, 0x355dfab6, 0x3ff, 'id1\x00', 'timer1\x00', 0x0, 0x0, 0x8, 0x5, 0x5}) write$UHID_DESTROY(r0, &(0x7f0000000d40), 0x4) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000d80)={@dev={0xfe, 0x80, [], 0x16}, 0x0, r3}) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000e00)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x14, r7, 0x300, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) write$uinput_user_dev(r5, &(0x7f0000000f00)={'syz1\x00', {0x101, 0x0, 0x80000001, 0xffffffffffff0001}, 0x11, [0xfffffffffffffffc, 0x40, 0x20, 0x28, 0x8000, 0x7, 0x401, 0x76b, 0x2, 0x7, 0x3c2, 0x3abfcf2, 0xdc99, 0x7, 0x67, 0xffffffff, 0x4f, 0x8, 0x0, 0x7f04, 0x8, 0x0, 0x3, 0x7, 0x1, 0x200, 0x4, 0xfffffffffffffe01, 0x1, 0x1, 0x8, 0x3, 0x20, 0x3f, 0x4, 0xfff, 0x8001, 0x8, 0xfffffffffffffffb, 0x0, 0x100000000, 0xe4e, 0x2, 0x2, 0xe6e3, 0xff, 0x8000, 0x3, 0x10000, 0x1, 0x1, 0x0, 0x6, 0xffffffff, 0x400, 0x6, 0x2, 0x5c0000000, 0x7f, 0x6, 0x2, 0x40, 0x2, 0x401], [0x3, 0x5, 0x3, 0x1000, 0x1, 0x1ca1, 0x20, 0x4c, 0xcbb, 0x5, 0x6, 0x401, 0x58aa, 0x9a8, 0x1, 0x8, 0x1, 0x8, 0x4, 0x72e, 0x7, 0x3, 0x3, 0x1, 0xf235, 0x4, 0xffff, 0x4, 0x2, 0x3, 0xd05, 0xffffffff, 0x10001, 0x8001, 0x1, 0x8ec, 0x0, 0x4000000000000, 0x2, 0x10001, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x67, 0x3, 0x80, 0xffffffffffff8000, 0x32a0, 0xffff, 0x200, 0xd2a3, 0x8, 0xff, 0x100000000, 0x6, 0x80000001, 0x6, 0x809, 0xf9, 0x8, 0x6, 0x7fffffff, 0x9, 0x9, 0x5], [0x620, 0x9, 0x8, 0x171, 0x81, 0x8, 0x5, 0x7, 0x0, 0x80, 0x5, 0x9, 0x9a, 0x3f, 0x2, 0x2, 0x9, 0x4, 0x3, 0x1f, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0xa057, 0xff, 0x0, 0x101, 0x7fffffff, 0xfffffffffffffffe, 0x9, 0x4, 0xca73, 0x8, 0x8, 0x100000001, 0x7fff, 0xf0, 0xc1a, 0xf59, 0x2, 0x3, 0x3, 0xffffffffffffff8f, 0x25, 0x0, 0xffffffffffffffe0, 0xfff, 0xffffffffffffff01, 0x2, 0xa6b, 0x3, 0x0, 0x8ce6, 0x4, 0x9, 0x81, 0x3f, 0x7, 0xdb, 0x10001, 0x68f, 0x1], [0x200, 0x5, 0x1, 0x2, 0x3, 0x1f, 0xffffffff, 0x5, 0x9, 0x7, 0x1ff, 0x4, 0x4, 0xf35, 0x2, 0xc94, 0x7, 0xffffffffffffff80, 0x303, 0x2, 0xd5, 0xfff, 0x6, 0xe356, 0x1, 0x5, 0x3, 0x0, 0x7, 0x7c, 0x4, 0x1, 0x40, 0x31e, 0x5, 0xfc89, 0x4, 0x81, 0x0, 0x2, 0x401, 0x4, 0xe0b, 0xffffffffffffffff, 0x401, 0x7fffffff, 0x1, 0xeb, 0x400, 0x3, 0xfff, 0x8, 0x1de, 0xfffffffffffffffe, 0x1ff, 0x1, 0x9, 0x400, 0x4, 0xaec2, 0x0, 0x5, 0x400, 0x40]}, 0x45c) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vcs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000013c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xea4}}, 0x7, 0xc0000, 0x8, 0x6e1d, 0x88}, &(0x7f0000001480)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f00000014c0)={r9, 0x2}, 0x8) 06:15:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x102, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f00000003c0)={0x6c, 0x7d, 0x1, {{0x0, 0x4b, 0x7fffffff, 0x6, {0x10, 0x0, 0x2}, 0x2080000, 0x0, 0x0, 0x8, 0x0, '', 0xc, '/dev/nullb0\x00', 0xc, '/dev/nullb0\x00'}, 0xc, '/dev/nullb0\x00', r2, r3, r4}}, 0x6c) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020300e93d934b5824481f0000000000030006000000000002000000e000000100000000000000000200010000000000000000020000000003000500ffffffff02000000e00000010000000000000000"], 0x50}}, 0x0) 06:15:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x8031, r0, 0x0) 06:15:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:15:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x0, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f0000000000)=[{&(0x7f0000e94000)=""/62, 0xffffffc2}], 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x5, 0x0, "03792985bfd2740ccdf6e090b2af3d90a351c37117239867390fa5b42ae363a6c6bb7d90c2f2333a1c7061911fcd70dd26de6e53daa50d5c36d458ac5c0639a94b42d08073c951f00d0d04f95152a319"}, 0xd8) 06:15:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000080)=0x76, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000050c0)=[{{&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f00000000c0)=""/111, 0x6f}], 0x2, &(0x7f00000002c0)=""/119, 0x77}, 0x7}, {{&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000440)=""/39, 0x27}, 0x7ff}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000007c0)=""/4096, 0x1000}], 0x1, &(0x7f00000004c0)=""/180, 0xb4}, 0x3}, {{&(0x7f00000017c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001840)=""/99, 0x63}, {&(0x7f00000018c0)=""/130, 0x82}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/30, 0x1e}, {&(0x7f00000029c0)=""/84, 0x54}], 0x5}, 0x800}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002ac0)=""/102, 0x66}, {&(0x7f0000002b40)=""/167, 0xa7}, {&(0x7f0000002c00)=""/96, 0x60}], 0x3, &(0x7f0000002cc0)=""/165, 0xa5}}, {{0x0, 0x0, &(0x7f0000004fc0)=[{&(0x7f0000002d80)=""/4, 0x4}, {&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/77, 0x4d}, {&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/138, 0x8a}, {&(0x7f0000004f00)=""/159, 0x9f}], 0x6, &(0x7f0000005040)=""/115, 0x73}, 0x5}], 0x6, 0x40, &(0x7f0000005240)={0x77359400}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000052c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000005300)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000005400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000005440)={@loopback, 0x0}, &(0x7f0000005480)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000005500)={@local, 0x0}, &(0x7f0000005540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000055c0)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000056c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000057c0)={0x0, @multicast1, @dev}, &(0x7f0000005800)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005840)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000005880)={0x11, 0x0, 0x0}, &(0x7f00000058c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005900)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000005a00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005a80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008480)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000008580)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f00000085c0)={@mcast2, 0x0}, &(0x7f0000008600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008640)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000008740)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008780)={0x0, @loopback, @local}, &(0x7f00000087c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008800)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000008900)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000009140)={&(0x7f0000005280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000009100)={&(0x7f0000008940)={0x7b0, r2, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x218, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r9}, {0x184, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1ff, 0x721, 0x5, 0xfffffffffffffe01}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r11}, {0x270, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x25d2}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r12}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x7, 0x5, 0x7, 0x8}, {0x4, 0x5, 0x200, 0x1}, {0x5, 0x7fff, 0x401, 0xfffffffffffeffff}, {0xfffffffffffffffd, 0x1, 0x3ff, 0x3}, {0x80000001, 0x7, 0x3, 0xc29}, {0xfffffffffffffffd, 0x4, 0x1000, 0x1}, {0x0, 0x79b, 0x1ff, 0x9}, {0x401, 0x1, 0x0, 0xe30d}, {0x0, 0x5, 0x4, 0xfffffffffffffff7}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9616}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}]}, 0x7b0}, 0x1, 0x0, 0x0, 0x44840}, 0x80) write$binfmt_elf32(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="858a030400000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f38139560901710abb44b348e059eeedc01dfac46a5fb2bf3f35be7ac08e0cd19c93cb6066d437da19740180b4abe0ac322a0000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e752504ff0700000000000020dd817a2b006117bbed9d8cd67c05d2da698c81a2610ad4df0000000000000000000038ce7a07005dac00000000358d"], 0xc9) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000006c0)="7b3f44bb317e743d9ad5d8ec648782fe7e385f9e386e65c31c99a5bd618f65ebc7ae93941961bb8ff2a41565e76e081b1ac91c49178cdad0bb518cf0bf42a4ae3d40c0ab23056cd45bc70ee4bb2ccbd52c39dbfcd5e0d142f834562ea724b90a94e79541e6f1652cdd267ab119c94b9c4314e472c02a1d2fe5fe5f82e469251c25b1a369d61e59c92e97d8325b4ea3336967ce45aaf50179ad88823f222f9ba9d99e7ebe94208b9d18b57039628db8e0b87f725289295f203f925c2fa18ea69d64988f55ddfc0f59d3fb14d21e1653607ad69115", 0xd4}], 0x1}}], 0x1, 0x0) 06:15:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000020000d0800000000000000000a300000000000000000000015000100b2168f283d153543fcf964ef06f814000100fe80"], 0x34}}, 0x0) 06:15:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:15:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x80003) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x408000, 0x0) read$alg(r1, &(0x7f0000000180)=""/201, 0xc9) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xd4, 0x8001) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f00000002c0)=0x2a) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000100)={0x10000, 0x4}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 06:15:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x5f) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007100, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 06:15:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:15:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x205, 0x8000000100079) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0xfffffffffffffffc, {0x892, 0xfffffffffffffffb, 0x4, 0x21, 0x32, 0x4}}) ioctl$KVM_CREATE_VCPU(r1, 0x80045505, 0x0) 06:15:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x5f) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007100, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 06:15:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:59 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:15:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:59 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @reserved}}) 06:15:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:59 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:59 executing program 2: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$VT_RELDISP(r0, 0xb704) 06:15:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x1) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000180)={{0x0, @name="ab256467398be7dab5cc13f27f7c8adaec6276b99111543c8fde443493d39df2"}, 0x8, 0xffffffffffffffff, 0xfffffffffffffffd}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = dup2(r2, r2) sendmsg$unix(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@cred={0x20}, @rights={0x10}], 0x30}, 0x0) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0x17}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6gre0\x00', 0x2000}) 06:15:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:15:59 executing program 2: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x200000000000031, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x210041, 0x0) write$P9_RVERSION(r0, &(0x7f0000001240)={0x15, 0x65, 0xffff, 0xf1d, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000)="a191aa4132f187e73cd1a06c47a464fcee6925cce3fac186e6facfb493f925e8a7a5704f010258ad58bb6548", &(0x7f0000000140)=""/152}, 0x18) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 06:15:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:15:59 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:15:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dlm_plock\x00', 0x1, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000180)="daed58365b7ee7b346b7f86fd5db1a86a3034b000292d4d871bb99db32eca7494d7c82d78b1ae6312f6e7b317495c4fe2338818e22cc83d294fbbc91d17d3433f62b31b5ed711d9416f080520d0740e9333890fdafe25f68420e15fe6bc1422c0363df83b3781004933a0caafed4cbd801c3412417a6fe7294c744daf4a09b171d4635f3ca531e80b24f48545f6d4e6d65298d4e08a8d397886db9262942c6a4325ebf51f639f165e85fdcaef87edb9a7e090a4b84a7c7985aa0fa249057c8bf8f451185136dee3997b37e54fb53ab50726df8000000000000007d7994fb076ce320ec5a00a700e3b12924c6e3adf1f6d788", 0xf2}], 0x1048, 0x0) 06:16:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:00 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000480)) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x1) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000180)={{0x0, @name="ab256467398be7dab5cc13f27f7c8adaec6276b99111543c8fde443493d39df2"}, 0x8, 0xffffffffffffffff, 0xfffffffffffffffd}) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = dup2(r2, r2) sendmsg$unix(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@cred={0x20}, @rights={0x10}], 0x30}, 0x0) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0x17}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6gre0\x00', 0x2000}) 06:16:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@rand_addr="b26a661c86743dda7ac30525906f511a", 0x4e23, 0x400, 0x4e21, 0x4, 0x2, 0x20, 0xa0, 0x3b, r2, r3}, {0x40, 0x575, 0x7ff, 0x2, 0x1, 0x988, 0x3, 0xffffffff8965fa57}, {0x8, 0xfffffffffffffffa, 0x100000000, 0x500000}, 0x8, 0x6e6bb0, 0x0, 0x938963393dfdd8c1, 0x3, 0x3}, {{@in=@loopback, 0x4d5}, 0x2, @in=@multicast1, 0x3506, 0x2, 0x0, 0xffffffffffffff01, 0x80000001, 0x2c8a17c5, 0x3}}, 0xe8) r4 = socket$inet(0x2, 0x1, 0x1000) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x190, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]}, 0x208) 06:16:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:00 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x73) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x101, 0xf229}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0x4}, 0x8) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x80, 0x0}, 0x0) 06:16:00 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000480)) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:00 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaff039459ee6c518bbd007679d3d56ded0f369078ac23147f069dfa02ae71020000000000000090f80000000000000000ac2314aaac140b0090d83893e4759b9a45b7"], 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xf3, "764a9af0b18ff41426e5b8f44bed8d8778cb9d893df31b3b0091489d7d5d4754a6c812eef01f6113bb9df9e7e097014ee7e931e148702df6ecffe6061e8e44db1b9def8383250056302c9b2891478a6e71c7f245a047ef1e8a02528298b175ea18db07bf76fc0848acf6bd93499c6d3afd73235be3a10b127533af4846bd6f0485f63aee0733b41e1e913047f3e742210782385368e7a0b1e609734a60e7d7998d8d0cd179d540af469ca0c56268a9d5909f7524dab53e37f044936605c6736b8f5aee95e5c0987bcbef7cadd0c390d424cff5b1021a11be20a02fb97effa6ee6c8f4381e21df095340c1cfe81832d3381a48b"}, &(0x7f00000001c0)=0xfb) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x7fffffff, 0x8, 0xa, 0x1, 0x675e, 0x1a, 0x9, 0xfd8c, r1}, &(0x7f0000000240)=0x20) 06:16:00 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:00 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000040)={{0x0, 0x7530}, 0x2, 0x3, 0xfffffffffffffffd}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)={0x188, 0x0, 0x1, [{0x0, 0x5, 0xe, 0x10001, 'vboxnet0vmnet1'}, {0x4, 0x6, 0x5, 0xdbc, '*eth1'}, {0x3, 0x7, 0x5, 0x7fff, '/eth0'}, {0x4, 0x55a, 0x0, 0x200}, {0x6, 0x7fff, 0x8, 0x6, 'net/udp\x00'}, {0x6, 0xff, 0x1a, 0x0, 'self*wlan1(I)em1vboxnet0]!'}, {0x5, 0x3, 0x1, 0x0, '}'}, {0x6, 0x36e, 0x21, 0xfffffffffffffffa, 'procwlan1\\selfvboxnet0keyringproc'}, {0x1, 0x0, 0x4, 0x4, '(GPL'}, {0x5, 0x6, 0x2, 0x1, '*+'}]}, 0x188) write$binfmt_elf32(r2, 0x0, 0x1fd) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 06:16:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000480)) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x41, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffff9, 0x2001) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x204000, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x80045503, &(0x7f0000000080)={0x200000081, 0x0, 0x0, 0x1f}) 06:16:00 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 444.753852][T28427] usb usb3: usbfs: process 28427 (syz-executor.5) did not claim interface 0 before use 06:16:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) [ 444.883836][T28461] usb usb3: usbfs: process 28461 (syz-executor.5) did not claim interface 0 before use 06:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:01 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') ioctl$FS_IOC_GETFLAGS(r0, 0xb704, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000000c0)='ns/user\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000240)='ns\x00\xa7?\xfd\x05D\xe9n>\xb4M\x9e\xfd1\x84\x94u\xabm\x7fuT \x9a\xe3\xb6I\x1d\xad/~\xe6\xd7Q\xb6\xdf\x8a\xbe2\xb0{\x17s\xacsp\xca\x04\xd4td\xadJ\xb0X\xf4\xea\xfeS\xb5\xb4\x8f\xf4\x9dB\xd4P]s?p$\xb3\x17%\xfa\xd8M\x05N\x8f\xd3\xa6\x9a\xfdB~\xe6\xdbU+\xdc\x0eZ\xd7\x86\xde\xbc\xdbi\xfdU\xa8\xc3\xd3\xa0\x12\xc4H\x8c7\\\xe4\x10(\f\xf5\x1c6N\xa2\xae%F\xb3\x8c?\xb9N\xe3W\xfd\xb3-\xfc\xa7\xee\xe3\xb0f\x88a\x96\xd3\x85Z$PB\xe2\xc9\xc7\x04\x13\x98V\xd9\x05\xfdZ\x85\x93.\xb0\xbe|\xcep\xe22\x89\xaff\x8a\xc3\xf5\x8a\x1b\xfa\xfb\xcd\xd8NR\xa4@|A:^R\x00Ez\x87\xabc\xae\xf6\x82\xfb\xf4i\xde\xd7\x81H\x04\x98\x9e\xe3G\xce\xd4\xe1\x8c\x97P+\xca(T\xe0\x8b\x80\x00i\xad\x8c\xbd\xd7\x1fQ\xb2\xc2C\t\x12W\x17\x83\xddj\x99\x85\xdc\x92\xe2L\x05&,/\xa7\xb0\xdc\xaa^ *\xde\xaf\x19Q\xb5\x8al`\x9f\x90\xd0\x8e\x17\x97\x92\xd1\xf5@') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='proc\x00'}, 0x30) syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/mnt\x00') modify_ldt$write(0x1, &(0x7f0000000100)={0x80000000, 0x1000, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2, 0x8, 0x7, 0xd75f}, 0x10) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 06:16:01 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000040)={{0x0, 0x7530}, 0x2, 0x3, 0xfffffffffffffffd}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)={0x188, 0x0, 0x1, [{0x0, 0x5, 0xe, 0x10001, 'vboxnet0vmnet1'}, {0x4, 0x6, 0x5, 0xdbc, '*eth1'}, {0x3, 0x7, 0x5, 0x7fff, '/eth0'}, {0x4, 0x55a, 0x0, 0x200}, {0x6, 0x7fff, 0x8, 0x6, 'net/udp\x00'}, {0x6, 0xff, 0x1a, 0x0, 'self*wlan1(I)em1vboxnet0]!'}, {0x5, 0x3, 0x1, 0x0, '}'}, {0x6, 0x36e, 0x21, 0xfffffffffffffffa, 'procwlan1\\selfvboxnet0keyringproc'}, {0x1, 0x0, 0x4, 0x4, '(GPL'}, {0x5, 0x6, 0x2, 0x1, '*+'}]}, 0x188) write$binfmt_elf32(r2, 0x0, 0x1fd) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 06:16:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:01 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x4, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000240)='eth0lomd5sum&!locgroup\x00'}, 0x30) fcntl$lock(r0, 0x27, &(0x7f00000002c0)={0x2, 0x3, 0x200, 0x9, r1}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0x6, 0x1, 0x4527, 0x5, 0x9, 0x80000001, 0xfffffffffffff9cd, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x6, 0x8000, 0x3, 0xffffffffffffff80, r3}, 0x10) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000000)=0x9) connect$vsock_dgram(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) dup2(r4, r5) 06:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:01 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:01 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:01 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty, 0x2000000000000001}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x50000000, @rand_addr="8019bbee3091106b10f1b2845a835da8", 0x1000000000000006}, 0xffffffffffffff2c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000000)={0x1}, 0x8) sendto$inet6(r0, 0x0, 0x2, 0x5000000, 0x0, 0x0) 06:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:02 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000040)={{0x0, 0x7530}, 0x2, 0x3, 0xfffffffffffffffd}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)={0x188, 0x0, 0x1, [{0x0, 0x5, 0xe, 0x10001, 'vboxnet0vmnet1'}, {0x4, 0x6, 0x5, 0xdbc, '*eth1'}, {0x3, 0x7, 0x5, 0x7fff, '/eth0'}, {0x4, 0x55a, 0x0, 0x200}, {0x6, 0x7fff, 0x8, 0x6, 'net/udp\x00'}, {0x6, 0xff, 0x1a, 0x0, 'self*wlan1(I)em1vboxnet0]!'}, {0x5, 0x3, 0x1, 0x0, '}'}, {0x6, 0x36e, 0x21, 0xfffffffffffffffa, 'procwlan1\\selfvboxnet0keyringproc'}, {0x1, 0x0, 0x4, 0x4, '(GPL'}, {0x5, 0x6, 0x2, 0x1, '*+'}]}, 0x188) write$binfmt_elf32(r2, 0x0, 0x1fd) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 06:16:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:02 executing program 5: semget(0x2, 0x3, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28}) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x7, 0x4) getpgrp(0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:16:02 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 446.217975][T28720] *** Guest State *** [ 446.229271][T28720] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 06:16:02 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 446.277381][T28720] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 06:16:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 446.369734][T28720] CR3 = 0x0000000000000000 [ 446.417382][T28720] PDPTR0 = 0x0000000000000000 PDPTR1 = 0x0000000000000000 [ 446.461808][T28720] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 446.486542][T28720] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 06:16:02 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000280), &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000040)={{0x0, 0x7530}, 0x2, 0x3, 0xfffffffffffffffd}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)={0x188, 0x0, 0x1, [{0x0, 0x5, 0xe, 0x10001, 'vboxnet0vmnet1'}, {0x4, 0x6, 0x5, 0xdbc, '*eth1'}, {0x3, 0x7, 0x5, 0x7fff, '/eth0'}, {0x4, 0x55a, 0x0, 0x200}, {0x6, 0x7fff, 0x8, 0x6, 'net/udp\x00'}, {0x6, 0xff, 0x1a, 0x0, 'self*wlan1(I)em1vboxnet0]!'}, {0x5, 0x3, 0x1, 0x0, '}'}, {0x6, 0x36e, 0x21, 0xfffffffffffffffa, 'procwlan1\\selfvboxnet0keyringproc'}, {0x1, 0x0, 0x4, 0x4, '(GPL'}, {0x5, 0x6, 0x2, 0x1, '*+'}]}, 0x188) write$binfmt_elf32(r2, 0x0, 0x1fd) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 06:16:02 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 446.509068][T28720] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 446.550599][T28720] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 446.605274][T28720] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.623221][T28720] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.636615][T28720] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.676140][T28720] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.705955][T28720] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.734277][T28720] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.751582][T28720] GDTR: limit=0x00000000, base=0x0000000000000000 [ 446.766931][T28720] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.793282][T28720] IDTR: limit=0x00000000, base=0x0000000000000000 [ 446.805116][T28720] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 446.815767][T28720] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 446.823306][T28720] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 446.831877][T28720] Interruptibility = 00000000 ActivityState = 00000000 [ 446.839301][T28720] *** Host State *** [ 446.843399][T28720] RIP = 0xffffffff811b40b0 RSP = 0xffff8880548df8e0 [ 446.850520][T28720] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 446.857840][T28720] FSBase=00007f126bf00700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 446.866988][T28720] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 446.874619][T28720] CR0=0000000080050033 CR3=0000000099dbc000 CR4=00000000001426f0 [ 446.882808][T28720] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 446.890825][T28720] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 446.897665][T28720] *** Control State *** [ 446.902068][T28720] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 446.909914][T28720] EntryControls=0000d1ff ExitControls=002fefff [ 446.916124][T28720] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 446.936952][T28720] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 06:16:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 446.945262][T28720] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 446.953869][T28720] reason=80000021 qualification=0000000000000000 [ 446.961630][T28720] IDTVectoring: info=00000000 errcode=00000000 [ 446.967778][T28720] TSC Offset = 0xffffff0e6ea4f96d [ 446.972868][T28720] EPT pointer = 0x000000009483501e 06:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x80000, 0x0) io_setup(0x20, &(0x7f00000003c0)=0x0) io_submit(r5, 0x5, &(0x7f0000001880)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x2, r3, &(0x7f0000000400)="0def8bfe6b2436b8896ed1488fcab093f16ef185775ae308fd36b2bc0339483d51a076c034c6eda8fd2865e81a2ee84cc68149b5633ec854fc9068b3919c15f80f495bd4cdbf6ef020a84ff8050ae0feb48e1edfd68c185f1de219e9c0ace7e197f86bbf9f589b5786112f2f25c526d54e3bfe94b0c8221df277b7d5aa7eabf0f686ca36e7cab13aa619a9e633f91da44c", 0x91, 0xffffffff, 0x0, 0x0, r2}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x9, 0x1ff, r3, &(0x7f0000000500)="eb2e3750fe0a3613aadf3a311a82eccf18f33a3e7ad0be3682637a2eb1d5db77d2fa98521ade3eb00f21d8fe282559e331a663c8465fc5f1014c470adeee61a7de1803fcabaad784978353b775041cd5d18b0f84de1d9736cc3bf0412a620ae2e1240d60af60ee", 0x67, 0x7, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x6, 0x500000000, r3, &(0x7f00000005c0)="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", 0x1000, 0x100000001, 0x0, 0x3, r4}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x7fffffff, r1, &(0x7f0000001600)="e92ef1876f2ac7bfa27871976a1a33f351233130a268737df3c1acda9d0b2d40d607df898ba42c83d91fa5b5f0210614bfe71703a62e934d09405985b5a1ce86bdb788094360cb445e4a4dbe304d293a65b12cb6a44c6828b7802880046616f3d27bedc540201104b1963e056ef315db6e1ea1dc9990c8d2356075f0c38fb894b5b0f1cdaad88e1c30e1f00e2b0768fb06fc9bc67d326a7da7840efe0d4296d9623286146c825b4743306c3fdaed4c3a54c127b636566d431c441ff6bf91316f2e7ac6d7", 0xc4, 0x66, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x3ff, r0, &(0x7f0000001740)="b3cb0f7b0294254b1af1a1db6b21ef7fd00fae13e4025f537714c23a1edc39ea908d938343c692ae815a2b6981dbc40fc7379a0ef3fe25d7a07f2218b3c1f6ceeb6d24acf8a7f484f71d166fb198b78c5cde4d047e0d57bd4fb077cd2566798a2053a1fd59297ac678cbb090c49b373dcbf043cb326959faa5ccde4a3a5b18b20a7f909695941bb609af8675c9a35f6c0822ad1c30cdfc63a88d8160872120b6cdcb2dd7d5976c7d1833468bfd421fc880fa95546e611f87af8aa8d91fddae918599a0cff7e14a52ed2af13d68cafea2d96a0af7768fa83dfb156b4f5d3d26e9", 0xe0, 0x2, 0x0, 0x3, r4}]) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x1, @local, 0x90}}, 0x3ff, 0x9}, &(0x7f0000000180)=0x90) clock_gettime(0x0, &(0x7f00000018c0)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000001900)={r7, r8+30000000}, &(0x7f0000001940)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000300)={r6, 0x2fb}, &(0x7f0000000340)=0x8) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001000002111d506606c6b991c42e67a793fac00000000000000000003eb05000000000002000000e00000010000000000000000080012000200020000000000000000003000000003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x20) 06:16:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:03 executing program 5: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) 06:16:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x404000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd, 0x2013, 0x1}) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r2, 0x90084520, &(0x7f0000000180)) 06:16:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:04 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x5, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r4, 0x7, 0x80, 0x8001}, &(0x7f0000000180)=0xfffffffffffffd3a) 06:16:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{}, {0x20, 'keyringvboxnet1'}, {0x20, 'self\x0eY\x90p0-+security\'+*'}, {}], 0xa, "e7ec59f64a223dca2c7c1f126710332ce159459eed9fe8ff4925c033550f7cdcb97bdc82e39367661ce335b12b4e07d25646cc17c54172c7067a49086f4f0d1e3eaa7059ae566b0d2a8ec4f28083751638fba8e0d0e6d11b83d8882cc0e09005f9d956b8e55508fc520b67f7431fb6"}, 0xa3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000), 0x1c2fd) 06:16:04 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:04 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 448.445968][ T1174] Bluetooth: hci1: sending frame failed (-49) 06:16:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400010000000000000000000000000000000000000000ffffffffffffffe0"], 0x24}}, 0x0) 06:16:04 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 450.460272][ T7851] Bluetooth: hci1: command 0x1003 tx timeout [ 450.467045][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 452.539064][ T3480] Bluetooth: hci1: command 0x1001 tx timeout [ 452.545235][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 454.618978][ T3480] Bluetooth: hci1: command 0x1009 tx timeout 06:16:14 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x5, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r4, 0x7, 0x80, 0x8001}, &(0x7f0000000180)=0xfffffffffffffd3a) 06:16:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x59, &(0x7f0000000080)={@dev={[], 0x23}, @random="574a20f6f74a", [{[], {0x8100, 0x20, 0x6c, 0x3}}], {@ipx={0x8137, {0xffff, 0x47, 0x7, 0x4, {@random=0x8, @broadcast, 0x10001}, {@random=0x66b, @broadcast, 0x400}, "f8bfd8e3daefc91fc6a5a54cb916ce8818c76635aca8786bf114eba2f4007cb9417d15cc316a71352d"}}}}, &(0x7f0000000100)={0x0, 0x2, [0xbc5, 0xc01, 0x23, 0xa4b]}) getrlimit(0x3, &(0x7f0000000140)) arch_prctl$ARCH_GET_CPUID(0x1011) syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0xf0ffff, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff87, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x2], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:16:14 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:14 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:15 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0xfff, 0x7, 0x3, {0x5, @win={{0x2, 0x100000001, 0x9, 0x7}, 0x6, 0x200, &(0x7f00000000c0)={{0x7, 0x931, 0x4, 0x1f}}, 0x8, &(0x7f0000000100)="bb6fb1da0c3fe71618b04a8a7ae08a965812f04532ce75e7604da1498101930afd0c0c2997b0c0d556f356f1521fdc03cdd5df71f47e61", 0x100000000}}}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x76, &(0x7f0000000140), 0x8) close(r2) close(r1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 06:16:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:15 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x1, r2, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:15 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 461.018770][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 461.025035][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 463.098759][ T2988] Bluetooth: hci1: command 0x1001 tx timeout [ 463.105029][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 465.178776][ T22] Bluetooth: hci1: command 0x1009 tx timeout 06:16:25 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x5, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r4, 0x7, 0x80, 0x8001}, &(0x7f0000000180)=0xfffffffffffffd3a) 06:16:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x10000004e20, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='team_slave_1\x00', 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x200000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0}) recvmmsg(r1, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200000, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000200)=""/22) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000848e"], 0x20) 06:16:25 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:25 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:25 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:25 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x100) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000380)={[], 0x401, 0x80, 0x7, 0x25b800000000, 0x40, r3}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r2, &(0x7f0000000280)="6656f6cbab8d513bb681eea333e63c7d5f6e934dfa1df11566728dd5ee23", &(0x7f00000002c0)=""/31}, 0x18) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa0000010}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0xffffffe1, r1, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8000) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000240)=[0x4, 0x1]) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x8f1e000000000000}, [@nested={0xc, 0x16, [@generic="e2abb4ec76"]}]}, 0x20}, 0x1, 0x300}, 0x0) 06:16:25 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:25 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 471.178929][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 471.185183][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 473.258846][ T3480] Bluetooth: hci1: command 0x1001 tx timeout [ 473.265186][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 475.338845][ T2988] Bluetooth: hci1: command 0x1009 tx timeout 06:16:35 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x5, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r4, 0x7, 0x80, 0x8001}, &(0x7f0000000180)=0xfffffffffffffd3a) 06:16:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000007c0)={'team0\x00', r4}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(r3, 0x0, &(0x7f0000000580)="ba883824fa7548dc5fe2ee43e3d85787b1a4f1437cdd45dabb546d78cfd40d0b039450dbb04016e1bf1fe6ac9b05c521b3216dd957a367be4b1f49d8b6b9c8e2f32672f7a13ec658670583242de8bbd1d049f09351e8da0fafefeb0dfd4f13409b9f0c42f75584e7fb01b5bc1b78456e00297a9c89ec23788e5106a87ff2714f73b0cdbd090ce3b78f842684ad4b39d70768a69e21450382c9a8d5c07a1285ac7387f8194de74ee3529445d0aed3762726de5275aa8ed4e48859c08bcbba252d1533d8d4ec6c49") ioctl$KVM_RUN(r2, 0xae80, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/187, 0xbb}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000500)=""/128, 0x80}, {0x0}, {&(0x7f0000001580)=""/232, 0xe8}], 0x5, &(0x7f0000001700)=""/210, 0xd2}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x2000000000000003, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r5, 0x0) 06:16:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:35 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)) 06:16:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:35 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)) 06:16:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 481.498867][ T22] Bluetooth: hci1: command 0x1003 tx timeout [ 481.504998][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 483.578776][ T22] Bluetooth: hci1: command 0x1001 tx timeout [ 483.584888][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 485.659559][ T22] Bluetooth: hci1: command 0x1009 tx timeout 06:16:45 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x5, 0x30}, 0xc) 06:16:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000280)) mknod(0x0, 0x0, 0x0) execve(0x0, &(0x7f0000000300), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) write$apparmor_exec(r2, 0x0, 0x0) 06:16:45 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)) 06:16:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e2016375203"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:45 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:45 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 491.739048][ T3480] Bluetooth: hci1: command 0x1003 tx timeout [ 491.745202][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 493.818920][ T3480] Bluetooth: hci1: command 0x1001 tx timeout [ 493.825722][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 495.898822][ T7851] Bluetooth: hci1: command 0x1009 tx timeout 06:16:55 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000080)=0x8) 06:16:55 executing program 5: 06:16:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:16:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:55 executing program 5: 06:16:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:16:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:16:56 executing program 5: 06:16:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:16:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 501.978794][ T3480] Bluetooth: hci1: command 0x1003 tx timeout [ 501.985002][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 504.058907][ T3480] Bluetooth: hci1: command 0x1001 tx timeout [ 504.065016][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 506.138865][ T3480] Bluetooth: hci1: command 0x1009 tx timeout 06:17:06 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0xeb1d, 0x4]) 06:17:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:06 executing program 5: 06:17:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:06 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:06 executing program 5: 06:17:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:06 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:06 executing program 5: 06:17:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 512.218983][ T7851] Bluetooth: hci1: command 0x1003 tx timeout [ 512.225143][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 514.298882][ T22] Bluetooth: hci1: command 0x1001 tx timeout [ 514.306121][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 516.379029][ T7851] Bluetooth: hci1: command 0x1009 tx timeout 06:17:16 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) 06:17:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000180)) 06:17:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:16 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:16 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:16 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:16 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r0}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000040)={0x0, r0}) 06:17:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:16 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 522.458960][ T22] Bluetooth: hci1: command 0x1003 tx timeout [ 522.466265][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 524.538969][ T22] Bluetooth: hci1: command 0x1001 tx timeout [ 524.545126][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 526.618948][ T22] Bluetooth: hci1: command 0x1009 tx timeout 06:17:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:26 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r0}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000040)={0x0, r0}) 06:17:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:26 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x1) 06:17:26 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:26 executing program 5: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000080)=[{&(0x7f0000002040)="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", 0xbd1}], 0x1) 06:17:26 executing program 5: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000080)=[{&(0x7f0000002040)="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", 0xbd1}], 0x1) 06:17:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:26 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r0}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000040)={0x0, r0}) 06:17:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:26 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:26 executing program 5: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000080)=[{&(0x7f0000002040)="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", 0xbd1}], 0x1) 06:17:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:27 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) [ 532.698788][ T3480] Bluetooth: hci1: command 0x1003 tx timeout [ 532.705050][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 534.778821][ T7851] Bluetooth: hci1: command 0x1001 tx timeout [ 534.784971][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 536.858824][ T3480] Bluetooth: hci1: command 0x1009 tx timeout 06:17:36 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r2, 0x400455c8, 0x1) 06:17:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000040)="0b135b3149cb12ea", 0x8, 0x0, 0x0, 0x0) 06:17:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:36 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='securityfs\x00', 0x0, 0x0) 06:17:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:37 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r2, 0x400455c8, 0x1) 06:17:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:37 executing program 5: getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) syz_genetlink_get_family_id$tipc2(0x0) 06:17:37 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r2, 0x400455c8, 0x1) 06:17:37 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:37 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:17:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:17:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:37 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:38 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={r1, 0x800, 0x30}, 0xfffffffffffffe8d) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:17:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff800000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000540)='\x00', 0x20000000) r1 = socket$inet6(0xa, 0xb, 0x6) ioctl$FICLONE(r0, 0x40049409, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/qat_adf_ctl\x00', 0x280000, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000580)={&(0x7f00000006c0), 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) r4 = getpid() r5 = syz_open_procfs(r4, 0x0) fcntl$setstatus(r5, 0x4, 0x4800) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r7 = mq_open(0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd}) write$FUSE_NOTIFY_DELETE(r5, &(0x7f00000007c0)=ANY=[], 0x2a4) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f00000003c0)={@in={0x2, 0x4e23, @multicast1}, {&(0x7f0000000280)=""/229, 0xe5}, &(0x7f0000000380), 0x77}, 0xa0) r8 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r6, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r5, 0xe, 0x3}, 0x14) setsockopt(r8, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0xffffffffffffff73) connect$inet(r8, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$VHOST_GET_VRING_BASE(r8, 0xc008af12, &(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r2) r9 = accept(r6, 0x0, &(0x7f0000000080)=0x1030b) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') read(r8, &(0x7f00000005c0)=""/144, 0x14c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000740)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, 0x0, 0x4000082) write(r7, &(0x7f0000000680), 0x313) sendmmsg(r8, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x13, 0x0, 0x0, 0x1}, 0x800}], 0x1, 0x0) 06:17:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 542.584623][T29661] dccp_close: ABORT with 1061 bytes unread 06:17:38 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:38 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:38 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xc0, 0x30, 0x3, 0x71b}, &(0x7f0000000240)=0x18) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:17:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff800000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000540)='\x00', 0x20000000) r1 = socket$inet6(0xa, 0xb, 0x6) ioctl$FICLONE(r0, 0x40049409, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/qat_adf_ctl\x00', 0x280000, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000580)={&(0x7f00000006c0), 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) r4 = getpid() r5 = syz_open_procfs(r4, 0x0) fcntl$setstatus(r5, 0x4, 0x4800) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r7 = mq_open(0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd}) write$FUSE_NOTIFY_DELETE(r5, &(0x7f00000007c0)=ANY=[], 0x2a4) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f00000003c0)={@in={0x2, 0x4e23, @multicast1}, {&(0x7f0000000280)=""/229, 0xe5}, &(0x7f0000000380), 0x77}, 0xa0) r8 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r6, 0x6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r5, 0xe, 0x3}, 0x14) setsockopt(r8, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0xffffffffffffff73) connect$inet(r8, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$VHOST_GET_VRING_BASE(r8, 0xc008af12, &(0x7f0000000480)) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r2) r9 = accept(r6, 0x0, &(0x7f0000000080)=0x1030b) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') read(r8, &(0x7f00000005c0)=""/144, 0x14c) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000740)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, 0x0, 0x4000082) write(r7, &(0x7f0000000680), 0x313) sendmmsg(r8, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x13, 0x0, 0x0, 0x1}, 0x800}], 0x1, 0x0) 06:17:38 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee8"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 543.020571][T29732] dccp_close: ABORT with 1061 bytes unread 06:17:39 executing program 5: pkey_mprotect(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/26, 0x1a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 06:17:39 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 544.778827][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 544.785802][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 546.858808][ T2988] Bluetooth: hci1: command 0x1001 tx timeout [ 546.864925][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 548.938824][ T3480] Bluetooth: hci1: command 0x1009 tx timeout 06:17:48 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:17:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) stat(0x0, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000007c0)={0xa0, 0x19, 0x0, {0x0, {0x0, 0x3}, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffff96, 0x0, 0x0, 0x101, 0x3, 0x0, 0x0, 0x6}}, 0xa0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="0000000000d37fee918c7faf3a0901f4febaa83be7000000000002000400"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x3}, 0x0) shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1f) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3f61ffe9, 0x6, 0x1f, 0xfff, 0x0, 0x2, 0x1}, 0x1c) sendto$inet(r0, &(0x7f0000000000), 0xa805000000000000, 0xc0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) semget$private(0x0, 0x2, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000340)=0x1, 0x4) perf_event_open(&(0x7f0000001c00)={0x0, 0x70, 0x5, 0x0, 0x0, 0x200, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10018cf, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ff7000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fanotify_mark(r1, 0x40, 0x1, r4, &(0x7f0000000240)='./file0\x00') r5 = dup2(r4, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000001bc0)=0x4) 06:17:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:49 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:49 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x0, r2}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r3) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) stat(0x0, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000007c0)={0xa0, 0x19, 0x0, {0x0, {0x0, 0x3}, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffff96, 0x0, 0x0, 0x101, 0x3, 0x0, 0x0, 0x6}}, 0xa0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="0000000000d37fee918c7faf3a0901f4febaa83be7000000000002000400"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x3}, 0x0) shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1f) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3f61ffe9, 0x6, 0x1f, 0xfff, 0x0, 0x2, 0x1}, 0x1c) sendto$inet(r0, &(0x7f0000000000), 0xa805000000000000, 0xc0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) semget$private(0x0, 0x2, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000340)=0x1, 0x4) perf_event_open(&(0x7f0000001c00)={0x0, 0x70, 0x5, 0x0, 0x0, 0x200, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10018cf, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ff7000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fanotify_mark(r1, 0x40, 0x1, r4, &(0x7f0000000240)='./file0\x00') r5 = dup2(r4, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000001bc0)=0x4) 06:17:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x0, r2}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r3) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 555.098905][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 555.105069][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 557.178849][ T2988] Bluetooth: hci1: command 0x1001 tx timeout [ 557.185215][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 559.258899][ T22] Bluetooth: hci1: command 0x1009 tx timeout 06:17:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:17:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:17:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x0, r2}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r3) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:59 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/$)\xf1h]K\xc2+/vs/drop_packet\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x174, r2, 0xb04, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffc1}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8e}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3800000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x68}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x4000090}, 0x40) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x0, 'team_slave_0\x00'}, 0x18) 06:17:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:17:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x740000, 0xf7ffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4004550d, 0x0) 06:17:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:17:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, 0x0) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:17:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 563.355724][T30054] vhci_hcd: invalid port number 255 06:17:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 563.404753][T30054] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 565.258814][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 565.264981][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 567.338831][ T17] Bluetooth: hci1: command 0x1001 tx timeout [ 567.345097][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 569.418907][ T2988] Bluetooth: hci1: command 0x1009 tx timeout 06:18:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:09 executing program 5: 06:18:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, 0x0) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:09 executing program 5: 06:18:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, 0x0) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:09 executing program 5: 06:18:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:09 executing program 5: 06:18:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:09 executing program 5: 06:18:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x0, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 5: 06:18:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) write(r1, &(0x7f0000000080)="2400000032001f06ff07f4f9002304000a04f5110c000200030100020800038005000000", 0x24) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x38a, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffff22d, 0x40000200], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:18:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x0, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x0, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @rand_addr, 0x3, 0x0, 'sh\x00\x00\x00\xd0\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x0, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x0, 0x0, &(0x7f00000000c0)) 06:18:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:10 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa02000000000086dd60f22a0005ca2c0000000000860000001600ffffe0000002ff0200000000000000c80000000001880090780009290060b680fa0000000000000000018023f246000000000000ffffffffffff00000000000000000000ffffac14ffbb"], 0x0) 06:18:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:18:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:10 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x0, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:18:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x0, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:18:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x0, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x1) 06:18:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x0, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:11 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x0, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x0, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x0, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:12 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) [ 577.738775][ T22] Bluetooth: hci1: command 0x1003 tx timeout [ 577.745011][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 579.818833][ T22] Bluetooth: hci1: command 0x1001 tx timeout [ 579.825007][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 581.898845][T29348] Bluetooth: hci1: command 0x1009 tx timeout 06:18:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local, 0x0, r2}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r3) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:22 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x0, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:22 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x0, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 586.740121][ T2980] Bluetooth: hci2: Frame reassembly failed (-84) [ 588.378914][ T17] Bluetooth: hci1: command 0x1003 tx timeout [ 588.385129][T30815] Bluetooth: hci1: sending frame failed (-49) [ 588.778740][T29348] Bluetooth: hci2: command 0x1003 tx timeout [ 588.784905][T30815] Bluetooth: hci2: sending frame failed (-49) [ 590.458836][T29348] Bluetooth: hci1: command 0x1001 tx timeout [ 590.464974][T30815] Bluetooth: hci1: sending frame failed (-49) [ 590.858794][T29348] Bluetooth: hci2: command 0x1001 tx timeout [ 590.864955][T30815] Bluetooth: hci2: sending frame failed (-49) [ 592.539018][ T17] Bluetooth: hci1: command 0x1009 tx timeout [ 592.938860][ T17] Bluetooth: hci2: command 0x1009 tx timeout 06:18:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:32 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x0, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x0, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:33 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x0, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 598.618780][ T17] Bluetooth: hci1: command 0x1003 tx timeout [ 598.624961][T30815] Bluetooth: hci1: sending frame failed (-49) [ 599.259499][ T17] Bluetooth: hci2: command 0x1003 tx timeout [ 599.265668][T30815] Bluetooth: hci2: sending frame failed (-49) [ 600.698831][ T17] Bluetooth: hci1: command 0x1001 tx timeout [ 600.704959][T30815] Bluetooth: hci1: sending frame failed (-49) [ 601.338897][T29348] Bluetooth: hci2: command 0x1001 tx timeout [ 601.345035][T30815] Bluetooth: hci2: sending frame failed (-49) [ 602.778850][T29348] Bluetooth: hci1: command 0x1009 tx timeout [ 603.418930][T29348] Bluetooth: hci2: command 0x1009 tx timeout 06:18:42 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x0, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x0, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000002400)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 06:18:42 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:42 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x0, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:43 executing program 2: r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c12a41d88b070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x0, 0x0) 06:18:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:43 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x0, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='cmdline\x00') semop(0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) io_submit(0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 06:18:43 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x0, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 609.498916][T29348] Bluetooth: hci1: command 0x1003 tx timeout [ 609.505064][ T8121] Bluetooth: hci1: sending frame failed (-49) [ 611.578858][T29348] Bluetooth: hci1: command 0x1001 tx timeout [ 611.584970][ T8121] Bluetooth: hci1: sending frame failed (-49) [ 613.658806][T29348] Bluetooth: hci1: command 0x1009 tx timeout 06:18:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:53 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = dup(r0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) write$P9_RRENAME(r1, 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) 06:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:53 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) unshare(0x6c060000) 06:18:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:53 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 617.811709][T31079] IPVS: ftp: loaded support on port[0] = 21 06:18:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:54 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) [ 618.131977][T31108] IPVS: ftp: loaded support on port[0] = 21 06:18:54 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:18:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) semget$private(0x0, 0x207, 0x20) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) 06:18:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:57 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:18:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:57 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:18:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0x9) 06:18:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:57 executing program 2: 06:18:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:57 executing program 2: 06:18:57 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, 0x0, &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udplite\x00') preadv(r0, &(0x7f0000001300)=[{&(0x7f0000001100)=""/86, 0x56}], 0x1, 0x100000000000) 06:18:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write$binfmt_elf32(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 06:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, 0x0, &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 622.016245][T31331] sg_write: data in/out 1023410140/46 bytes for SCSI command 0x0-- guessing data in; [ 622.016245][T31331] program syz-executor.2 not setting count and/or reply_len properly 06:18:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 622.151036][T31331] sg_write: data in/out 1023410140/46 bytes for SCSI command 0x0-- guessing data in; [ 622.151036][T31331] program syz-executor.2 not setting count and/or reply_len properly 06:18:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, 0x0, &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs$namespace(0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) sched_getparam(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 06:18:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', 0x0, 0x0, 0x5) 06:18:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x228, [0x20000580, 0x0, 0x0, 0x200005b0, 0x20000738], 0x0, 0x0, &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'nr0\x00', 'vcan0\x00', 'nr0\x00', @local, [], @remote, [], 0xc0, 0xc0, 0xf8, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@rand_addr="fbf0fd2d7903d84e66696c5d04249f51", [0x0, 0x0, 0xff, 0xffffff00], 0x4e21, 0x0, 0x3, 0x4e24, 0x0, 0x20}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@random="66a9be4aa84c", 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2a0) 06:18:58 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) 06:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', 0x0, 0x0, 0x5) 06:18:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', 0x0, 0x0, 0x5) 06:18:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:18:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) 06:18:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:18:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) 06:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\x8d\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:18:59 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:18:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:18:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:18:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) 06:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:19:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:19:00 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:19:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, 0x0) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:19:00 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:19:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:19:00 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 624.356093][T31737] FAULT_INJECTION: forcing a failure. [ 624.356093][T31737] name failslab, interval 1, probability 0, space 0, times 0 06:19:00 executing program 4 (fault-call:21 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 624.446976][T31737] CPU: 0 PID: 31737 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 624.455016][T31737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.465255][T31737] Call Trace: [ 624.468569][T31737] dump_stack+0x172/0x1f0 [ 624.472926][T31737] should_fail.cold+0xa/0x15 [ 624.477549][T31737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 624.483383][T31737] ? ___might_sleep+0x163/0x280 [ 624.488263][T31737] __should_failslab+0x121/0x190 [ 624.493262][T31737] should_failslab+0x9/0x14 [ 624.497795][T31737] kmem_cache_alloc_trace+0x2d1/0x760 [ 624.503202][T31737] ? ___might_sleep+0x163/0x280 [ 624.508079][T31737] hci_alloc_dev+0x43/0x1d00 [ 624.512702][T31737] hci_uart_tty_ioctl+0x2d7/0xb00 [ 624.517755][T31737] tty_ioctl+0xac9/0x14d0 [ 624.522102][T31737] ? hci_uart_init_work+0x150/0x150 [ 624.527324][T31737] ? tty_register_device+0x40/0x40 [ 624.532462][T31737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 624.538741][T31737] ? tomoyo_init_request_info+0x105/0x1d0 [ 624.544748][T31737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.551012][T31737] ? tomoyo_path_number_perm+0x263/0x520 [ 624.556671][T31737] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 624.562512][T31737] ? __lockdep_free_key_range+0x120/0x120 [ 624.568300][T31737] ? __fget+0x35a/0x550 [ 624.572489][T31737] ? tty_register_device+0x40/0x40 [ 624.577639][T31737] do_vfs_ioctl+0xd6e/0x1390 [ 624.582267][T31737] ? ioctl_preallocate+0x210/0x210 [ 624.587394][T31737] ? __fget+0x381/0x550 [ 624.591568][T31737] ? ksys_dup3+0x3e0/0x3e0 06:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 624.595995][T31737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 624.602253][T31737] ? fput_many+0x12c/0x1a0 [ 624.606688][T31737] ? tomoyo_file_ioctl+0x23/0x30 [ 624.611725][T31737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.618070][T31737] ? security_file_ioctl+0x93/0xc0 [ 624.623196][T31737] ksys_ioctl+0xab/0xd0 [ 624.627543][T31737] __x64_sys_ioctl+0x73/0xb0 [ 624.632151][T31737] do_syscall_64+0x103/0x610 [ 624.636877][T31737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.642783][T31737] RIP: 0033:0x458209 [ 624.646695][T31737] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.666318][T31737] RSP: 002b:00007f126beffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 624.674747][T31737] RAX: ffffffffffffffda RBX: 00007f126beffc90 RCX: 0000000000458209 [ 624.683254][T31737] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 06:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="010000000067b278ccf0b7caa23e3800000082000040000000000200000000000100000000000000d42688aa2b9cf6604ec2c5f15daf42d3bfdca7c4626b12b145d42a57d14db302fae5cea607c12607b6b96343b1d7c44dc4818fb3f439ebb4f0a1a17c30408542c1703229d651c4ce56660886fe00733738714d6b524507528cb835318bb5641eda598b00ef62f9b5f11baa5483344b259aeee37bd00ba877dedc448532266dafe40030a2de03c9307b3579e3f4c4b7616b233b899080368198b0115ef74d9d1380824edd59b2789924fa0fa07bd0f8bc171325774898bb01cbd5bb91a284b2110dd293890154ad73fe0175d6060017d6d554949abe4d31abaf0d975a09af4b1e945cdeb8af18b1341bcc96ecf0514ba89d7a0c6e0f156a5b73f0adb39673d79447cac5ef000000000000000000f9853f3044101431a54a043cd897f64f6ed29e5cffe780574509f3bbd27a6e201637520326a997bcdab4493994a5e7f61cb65515a2cc697e217bdc6322ed481e74792624a0aa52d42df7a7c9bfa11c184bdd88f54ce3bb84dd8e4a9c271fb82e615a6db3f7870216dd5dbf64c369be18a7e33c2308d17fd9c0274dee5aed58e1359712ee5a1a8977b8f63f384e84fe9bd95da0cee85d"]) ioctl$BLKTRACESTART(r5, 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:19:00 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) [ 624.691236][T31737] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 624.699217][T31737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f126bf006d4 [ 624.707229][T31737] R13: 00000000004c09f8 R14: 00000000004d2770 R15: 0000000000000004 06:19:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xff\xff\xff\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 624.762066][T31737] Bluetooth: Can't allocate HCI device 06:19:00 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:19:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1) 06:19:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:19:01 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 624.954948][T31971] FAULT_INJECTION: forcing a failure. [ 624.954948][T31971] name failslab, interval 1, probability 0, space 0, times 0 06:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x7f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:19:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x301, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 625.063940][T31971] CPU: 0 PID: 31971 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 625.071974][T31971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.082038][T31971] Call Trace: [ 625.085352][T31971] dump_stack+0x172/0x1f0 [ 625.089707][T31971] should_fail.cold+0xa/0x15 [ 625.094321][T31971] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.100150][T31971] ? ___might_sleep+0x163/0x280 [ 625.105024][T31971] __should_failslab+0x121/0x190 [ 625.109981][T31971] should_failslab+0x9/0x14 [ 625.114504][T31971] kmem_cache_alloc_trace+0x2d1/0x760 [ 625.119893][T31971] ? pm_runtime_init+0x311/0x3b0 [ 625.124854][T31971] ? device_initialize+0x1a1/0x440 [ 625.129988][T31971] h4_open+0x46/0x160 [ 625.133980][T31971] hci_uart_tty_ioctl+0x709/0xb00 [ 625.139022][T31971] tty_ioctl+0xac9/0x14d0 [ 625.143362][T31971] ? hci_uart_init_work+0x150/0x150 [ 625.148573][T31971] ? tty_register_device+0x40/0x40 [ 625.153702][T31971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xf0\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 625.159959][T31971] ? tomoyo_init_request_info+0x105/0x1d0 [ 625.165689][T31971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.171951][T31971] ? tomoyo_path_number_perm+0x263/0x520 [ 625.177620][T31971] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 625.183439][T31971] ? __lockdep_free_key_range+0x120/0x120 [ 625.189191][T31971] ? __fget+0x35a/0x550 [ 625.193375][T31971] ? tty_register_device+0x40/0x40 [ 625.198514][T31971] do_vfs_ioctl+0xd6e/0x1390 [ 625.203122][T31971] ? ioctl_preallocate+0x210/0x210 [ 625.208243][T31971] ? __fget+0x381/0x550 [ 625.212419][T31971] ? ksys_dup3+0x3e0/0x3e0 [ 625.216854][T31971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.223099][T31971] ? fput_many+0x12c/0x1a0 [ 625.228659][T31971] ? tomoyo_file_ioctl+0x23/0x30 [ 625.233618][T31971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.239888][T31971] ? security_file_ioctl+0x93/0xc0 [ 625.245022][T31971] ksys_ioctl+0xab/0xd0 [ 625.249205][T31971] __x64_sys_ioctl+0x73/0xb0 [ 625.253807][T31971] do_syscall_64+0x103/0x610 [ 625.258424][T31971] entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfe\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 625.264333][T31971] RIP: 0033:0x458209 [ 625.268242][T31971] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.287889][T31971] RSP: 002b:00007f126beffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 625.296312][T31971] RAX: ffffffffffffffda RBX: 00007f126beffc90 RCX: 0000000000458209 [ 625.304296][T31971] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 [ 625.312284][T31971] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 625.320272][T31971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f126bf006d4 [ 625.328249][T31971] R13: 00000000004c09f8 R14: 00000000004d2770 R15: 0000000000000004 06:19:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x125d, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:19:01 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:19:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:19:01 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000a40)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 625.528457][T32103] FAULT_INJECTION: forcing a failure. [ 625.528457][T32103] name failslab, interval 1, probability 0, space 0, times 0 [ 625.588783][T32103] CPU: 0 PID: 32103 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 625.596827][T32103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.606894][T32103] Call Trace: [ 625.610200][T32103] dump_stack+0x172/0x1f0 [ 625.614550][T32103] should_fail.cold+0xa/0x15 [ 625.619155][T32103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.624975][T32103] ? ___might_sleep+0x163/0x280 [ 625.629849][T32103] __should_failslab+0x121/0x190 [ 625.634804][T32103] should_failslab+0x9/0x14 [ 625.639327][T32103] __kmalloc+0x2dc/0x740 [ 625.643584][T32103] ? alloc_workqueue+0x13e/0xf30 [ 625.648539][T32103] alloc_workqueue+0x13e/0xf30 [ 625.653327][T32103] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 625.659057][T32103] ? scnprintf+0x140/0x140 [ 625.663503][T32103] ? kmem_cache_alloc_trace+0x354/0x760 [ 625.669064][T32103] hci_register_dev+0x1b8/0x860 [ 625.669122][T32103] ? __raw_spin_lock_init+0x2d/0x100 [ 625.669144][T32103] hci_uart_tty_ioctl+0x766/0xb00 [ 625.669165][T32103] tty_ioctl+0xac9/0x14d0 [ 625.669182][T32103] ? hci_uart_init_work+0x150/0x150 [ 625.669198][T32103] ? tty_register_device+0x40/0x40 [ 625.669213][T32103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.669230][T32103] ? tomoyo_init_request_info+0x105/0x1d0 [ 625.669251][T32103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.679398][T32103] ? tomoyo_path_number_perm+0x263/0x520 [ 625.679418][T32103] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 625.679433][T32103] ? __lockdep_free_key_range+0x120/0x120 [ 625.679459][T32103] ? __fget+0x35a/0x550 [ 625.679490][T32103] ? tty_register_device+0x40/0x40 [ 625.679510][T32103] do_vfs_ioctl+0xd6e/0x1390 [ 625.679531][T32103] ? ioctl_preallocate+0x210/0x210 [ 625.679546][T32103] ? __fget+0x381/0x550 [ 625.679568][T32103] ? ksys_dup3+0x3e0/0x3e0 [ 625.771840][T32103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.778100][T32103] ? fput_many+0x12c/0x1a0 [ 625.782536][T32103] ? tomoyo_file_ioctl+0x23/0x30 [ 625.787496][T32103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.793755][T32103] ? security_file_ioctl+0x93/0xc0 [ 625.793776][T32103] ksys_ioctl+0xab/0xd0 [ 625.793795][T32103] __x64_sys_ioctl+0x73/0xb0 [ 625.793822][T32103] do_syscall_64+0x103/0x610 [ 625.793842][T32103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.793853][T32103] RIP: 0033:0x458209 [ 625.793868][T32103] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.793877][T32103] RSP: 002b:00007f126beffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 625.793892][T32103] RAX: ffffffffffffffda RBX: 00007f126beffc90 RCX: 0000000000458209 [ 625.793901][T32103] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 [ 625.793910][T32103] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 625.793919][T32103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f126bf006d4 [ 625.793927][T32103] R13: 00000000004c09f8 R14: 00000000004d2770 R15: 0000000000000004 [ 625.808447][T32103] Bluetooth: Can't register HCI device [ 627.098857][ T2988] Bluetooth: hci1: command 0x1003 tx timeout [ 627.105008][ T8121] Bluetooth: hci1: sending frame failed (-49) [ 629.178986][ T2988] Bluetooth: hci1: command 0x1001 tx timeout [ 629.189121][ T8121] Bluetooth: hci1: sending frame failed (-49) [ 631.258803][ T2988] Bluetooth: hci1: command 0x1009 tx timeout 06:19:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x2, 0x1) 06:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x125e, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:19:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2, 0x0) unshare(0x10544) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x18000, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000140), 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) fgetxattr(0xffffffffffffffff, &(0x7f0000000400)=@known='trusted.overlay.origin\x00', 0x0, 0x0) ptrace$cont(0x20, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x2000000a, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="9a809a21f17b36b65bb89069dc3f65fc65458418b9c7bc3986c62dde6362f247e5c5e11bec747695838560096645128589262ce4896a96312cc8a689dc2d7bbbc4c539c194859ad0a33aece85bc85acf8d42c86b32a796946cb5e097966799e63f2da500000000000000000000"], 0x6d) rt_sigaction(0x8, &(0x7f0000000300)={&(0x7f00000000c0)="c442210233642e430f73f003c46169eb1d176f763ff3420fbc83e1080000660fae31c4c1f92970d0c442fd35f7f3450f0f16b4c421fb2c5cd579c4e215bbd7", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000480), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:19:11 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:19:11 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) 06:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 635.564092][T32229] FAULT_INJECTION: forcing a failure. [ 635.564092][T32229] name failslab, interval 1, probability 0, space 0, times 0 [ 635.622491][T32229] CPU: 0 PID: 32229 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 635.630533][T32229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.640623][T32229] Call Trace: [ 635.643936][T32229] dump_stack+0x172/0x1f0 [ 635.648286][T32229] should_fail.cold+0xa/0x15 [ 635.652903][T32229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 635.658739][T32229] ? ___might_sleep+0x163/0x280 [ 635.658760][T32229] __should_failslab+0x121/0x190 [ 635.658790][T32229] should_failslab+0x9/0x14 [ 635.668697][T32229] kmem_cache_alloc_trace+0x2d1/0x760 [ 635.668713][T32229] ? rcu_read_lock_sched_held+0x110/0x130 [ 635.668726][T32229] ? __kmalloc+0x5d5/0x740 [ 635.668748][T32229] alloc_workqueue_attrs+0x82/0x120 [ 635.668765][T32229] alloc_workqueue+0x17b/0xf30 [ 635.668789][T32229] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 635.688807][T32229] ? scnprintf+0x140/0x140 [ 635.688845][T32229] ? kmem_cache_alloc_trace+0x354/0x760 [ 635.688867][T32229] hci_register_dev+0x1b8/0x860 06:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x125f, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 635.688890][T32229] ? __raw_spin_lock_init+0x2d/0x100 [ 635.698969][T32229] hci_uart_tty_ioctl+0x766/0xb00 [ 635.698990][T32229] tty_ioctl+0xac9/0x14d0 [ 635.699005][T32229] ? hci_uart_init_work+0x150/0x150 [ 635.699020][T32229] ? tty_register_device+0x40/0x40 [ 635.699035][T32229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.699057][T32229] ? tomoyo_init_request_info+0x105/0x1d0 [ 635.758100][T32229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.764454][T32229] ? tomoyo_path_number_perm+0x263/0x520 06:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1260, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) [ 635.770125][T32229] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 635.784555][T32229] ? __lockdep_free_key_range+0x120/0x120 [ 635.790391][T32229] ? __fget+0x35a/0x550 [ 635.794577][T32229] ? tty_register_device+0x40/0x40 [ 635.800254][T32229] do_vfs_ioctl+0xd6e/0x1390 [ 635.804872][T32229] ? ioctl_preallocate+0x210/0x210 [ 635.809991][T32229] ? __fget+0x381/0x550 [ 635.814163][T32229] ? ksys_dup3+0x3e0/0x3e0 [ 635.818607][T32229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 635.824860][T32229] ? fput_many+0x12c/0x1a0 [ 635.829286][T32229] ? tomoyo_file_ioctl+0x23/0x30 [ 635.829303][T32229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.829335][T32229] ? security_file_ioctl+0x93/0xc0 [ 635.840515][T32229] ksys_ioctl+0xab/0xd0 [ 635.840534][T32229] __x64_sys_ioctl+0x73/0xb0 [ 635.840552][T32229] do_syscall_64+0x103/0x610 [ 635.840571][T32229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.840592][T32229] RIP: 0033:0x458209 [ 635.870646][T32229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.890275][T32229] RSP: 002b:00007f126beffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 635.898704][T32229] RAX: ffffffffffffffda RBX: 00007f126beffc90 RCX: 0000000000458209 [ 635.906689][T32229] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 [ 635.914722][T32229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 635.922703][T32229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f126bf006d4 [ 635.930689][T32229] R13: 00000000004c09f8 R14: 00000000004d2770 R15: 0000000000000004 06:19:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4008008080001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local, 0x0, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fdatasync(r4) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r5, 0x1261, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000008c0)={0x1, "45a69a087de9fafbb13f6c443a27b48590e8c3065af0486dbda48261cb324a97", 0x1, 0x800, 0x1, 0x7b6, 0x11, 0x3}) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000640)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x5) 06:19:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5409, 0x1) [ 635.995604][T32229] WARNING: CPU: 0 PID: 32229 at kernel/locking/lockdep.c:4925 lockdep_unregister_key+0x1ef/0x4c0 [ 635.996421][ T3876] kobject: 'loop4' (00000000cc69b28b): kobject_uevent_env [ 636.006137][T32229] Kernel panic - not syncing: panic_on_warn set ... [ 636.006153][T32229] CPU: 0 PID: 32229 Comm: syz-executor.5 Not tainted 5.1.0-rc1+ #32 [ 636.006160][T32229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.006164][T32229] Call Trace: [ 636.006185][T32229] dump_stack+0x172/0x1f0 06:19:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e330897501f9007b6b482550829e022b8753a188748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637ce0080b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3d009d308bd73f47725390000000000000000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 636.006200][T32229] ? lockdep_unregister_key+0x130/0x4c0 [ 636.006214][T32229] panic+0x2cb/0x65c [ 636.006237][T32229] ? __warn_printk+0xf3/0xf3 [ 636.057579][ T3876] kobject: 'loop4' (00000000cc69b28b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 636.059513][T32229] ? lockdep_unregister_key+0x1ef/0x4c0 [ 636.059529][T32229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.059545][T32229] ? __warn.cold+0x5/0x45 [ 636.059561][T32229] ? lockdep_unregister_key+0x1ef/0x4c0 [ 636.059573][T32229] __warn.cold+0x20/0x45 [ 636.059587][T32229] ? lockdep_unregister_key+0x1ef/0x4c0 [ 636.059601][T32229] report_bug+0x263/0x2b0 [ 636.059618][T32229] do_error_trap+0x11b/0x200 [ 636.059638][T32229] do_invalid_op+0x37/0x50 [ 636.095224][ T3876] kobject: 'loop2' (00000000a1346705): kobject_uevent_env [ 636.095669][T32229] ? lockdep_unregister_key+0x1ef/0x4c0 [ 636.106224][ T3876] kobject: 'loop2' (00000000a1346705): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 636.110141][T32229] invalid_op+0x14/0x20 [ 636.110160][T32229] RIP: 0010:lockdep_unregister_key+0x1ef/0x4c0 [ 636.110174][T32229] Code: 00 00 00 00 00 fc ff df 4c 89 c2 48 c1 ea 03 80 3c 02 00 0f 85 c9 02 00 00 48 b8 00 02 00 00 00 00 ad de 49 89 44 24 08 eb 02 <0f> 0b ba 01 00 00 00 4c 89 e6 4c 89 ff e8 8f de ff ff 4c 89 ff e8 [ 636.110182][T32229] RSP: 0018:ffff88805ba5f950 EFLAGS: 00010046 [ 636.110194][T32229] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff12bcb4b [ 636.110201][T32229] RDX: 1ffffffff1467863 RSI: 0000000000000000 RDI: ffffffff8a33c318 [ 636.110208][T32229] RBP: ffff88805ba5f980 R08: 1ffff1100b74bf1e R09: ffffed100b74bf1f [ 636.110217][T32229] R10: ffffed100b74bf1e R11: 0000000000000003 R12: ffff888090f7a1d8 [ 636.110225][T32229] R13: dffffc0000000000 R14: 0000000000000282 R15: ffffffff8a0b7738 [ 636.110249][T32229] alloc_workqueue+0xc52/0xf30 [ 636.110271][T32229] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 636.118942][ T3876] kobject: 'loop3' (00000000cd60d152): kobject_uevent_env [ 636.121785][T32229] ? scnprintf+0x140/0x140 [ 636.121806][T32229] ? kmem_cache_alloc_trace+0x354/0x760 [ 636.121831][T32229] hci_register_dev+0x1b8/0x860 [ 636.121848][T32229] ? __raw_spin_lock_init+0x2d/0x100 [ 636.121866][T32229] hci_uart_tty_ioctl+0x766/0xb00 [ 636.121887][T32229] tty_ioctl+0xac9/0x14d0 [ 636.129780][ T3876] kobject: 'loop3' (00000000cd60d152): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 636.137612][T32229] ? hci_uart_init_work+0x150/0x150 [ 636.137628][T32229] ? tty_register_device+0x40/0x40 [ 636.137642][T32229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 636.137658][T32229] ? tomoyo_init_request_info+0x105/0x1d0 [ 636.137672][T32229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.137683][T32229] ? tomoyo_path_number_perm+0x263/0x520 [ 636.137704][T32229] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 636.310339][T32229] ? __lockdep_free_key_range+0x120/0x120 [ 636.316070][T32229] ? __fget+0x35a/0x550 [ 636.320228][T32229] ? tty_register_device+0x40/0x40 [ 636.325344][T32229] do_vfs_ioctl+0xd6e/0x1390 [ 636.329937][T32229] ? ioctl_preallocate+0x210/0x210 [ 636.335045][T32229] ? __fget+0x381/0x550 [ 636.339197][T32229] ? ksys_dup3+0x3e0/0x3e0 [ 636.343609][T32229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 636.349853][T32229] ? fput_many+0x12c/0x1a0 [ 636.354267][T32229] ? tomoyo_file_ioctl+0x23/0x30 [ 636.359205][T32229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.365441][T32229] ? security_file_ioctl+0x93/0xc0 [ 636.370556][T32229] ksys_ioctl+0xab/0xd0 [ 636.374711][T32229] __x64_sys_ioctl+0x73/0xb0 [ 636.379300][T32229] do_syscall_64+0x103/0x610 [ 636.383887][T32229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.389774][T32229] RIP: 0033:0x458209 [ 636.393664][T32229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.413272][T32229] RSP: 002b:00007f126beffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 636.421683][T32229] RAX: ffffffffffffffda RBX: 00007f126beffc90 RCX: 0000000000458209 [ 636.429669][T32229] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 [ 636.437638][T32229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 636.445608][T32229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f126bf006d4 [ 636.453576][T32229] R13: 00000000004c09f8 R14: 00000000004d2770 R15: 0000000000000004 [ 637.603566][T32229] Shutting down cpus with NMI [ 637.609094][T32229] Kernel Offset: disabled [ 637.613415][T32229] Rebooting in 86400 seconds..