f_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f00000000c0), 0x20000048) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400202, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000100)) 10:54:33 executing program 1: socket$kcm(0x29, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r3, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000001040)={0x0, 0xfb, 0xe1, 0x0, 0x0, "594b43e575e2594ee63efe1dd27a88ac", "9c0dc91049457c2683f819e89d4f033809c063f34575eea4bfafe728303f66eddeb075d15df8f93fb1e4a9d87f3721bf37e4b105e6458f8b475813f969bd59a3b82054ee86e106511bfc120c3fe9c826b2c31bbb8b01f067c34d60fc0c4d02ed274b74ded7b33daecdab96b7e2b04615f2540b886c6f4d10c663f9d33d97b2d2afab4a1729639b8f912b20add669a66b13bbaca31d328a8bfccd5de832a9b017505de3cf26f1354d7d0aeb19a7bec61834a2ce001302ad2319ac3f2513e6ef2425a4cd80fde5180c1d40f642"}, 0xe1, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffebb, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x20, 0x2af) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x22) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000140)='/:c\xef\xeb\t^\x1be;\x17\xfc\x0f\xd8\xba\xb0') 10:54:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) unshare(0x600) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80202, 0x1f) ioctl$PPPIOCGDEBUG(r1, 0x80047441, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000440)={0x803, 0x0, 0x0, 'queue1\x00'}) uname(&(0x7f0000000300)=""/66) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000780)={{{@in=@local, @in=@broadcast}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) r2 = semget$private(0x0, 0x0, 0x400) semctl$SETVAL(r2, 0x8000000000003, 0x10, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000140)={0x9, 0x20000000, 0x4400, 0x774c, 0x101, 0x1, 0x3, 0x9, 0x2ffb, 0xfffffffffffffff7}) getsockopt$packet_buf(r3, 0x107, 0x3, &(0x7f0000000600)=""/208, &(0x7f0000000180)=0xd0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x3e, &(0x7f00000000c0)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x2}]]}}}]}, 0x38}}, 0x0) close(r3) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) socket$packet(0x11, 0x3, 0x300) [ 1973.972300][ C0] net_ratelimit: 26 callbacks suppressed [ 1973.972309][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1973.972328][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1973.978171][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1973.983952][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1973.984051][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1974.007216][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1974.013138][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:54:33 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000140)={0xa, 0x0, 0x713}, 0xa) 10:54:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1974.018952][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:54:33 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfc00, @ipv4={[], [], @dev}}, 0x1c) [ 1974.053271][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1974.059963][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:54:33 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x90080, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x2, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'ib', 0x3a, 'team_slave_0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x84) r2 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000bd1402040200"], 0x10) 10:54:33 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffebb, &(0x7f0000000100)}, 0x0) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0xfff, @loopback, 0x1}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000200)="46803d77bc22ad4a7f5231cf9870319e6dead6af215f0afdefd267f1829c4f932ed832152b9bd92ea5e68a8e68ee6644a82b3f5bea8ee9ed376d1f01859a9946d517a6a22a89da405604ccb090f5b8b0b8a5d046790169a4d2cb3ba423fa3ec9f1b251121b42c342969dac18ee94ac697cdaaf3fce8e1b8b722bf0eb869e7ca024c2bc554e1640e346456176ed6eb5e8d2f54ad6", 0x94}, {&(0x7f0000000080)="9958e7d1ec5f5e32980a0f3be3b97f7f5aaf485c4cbef4b66cb438dc6b929261e815c9085695d78279129ad41e0a8334545a53fdbd74b498602abb8649", 0x3d}, {&(0x7f00000000c0)="3d1a3f164368", 0x6}, {&(0x7f00000002c0)="ee52a518b3d5088bd4cfaf6d5bd9ea3a89cae2c78c51b141d33f6c7fae8ff47c517e25b377d2b99f4dc8328e436208b158e9405025555dff8c5ba0f74b65e55c88246e3b1e8d4d6b8f9e411c338a8c3e763abfb4a0a31c3fd6b453d26b244c38856f18831deca838e58a186317160bcab8b9d4c7befdd0dbbbd40bf85349bd8944a6c47c3947ebb5103920f064009c4d71b330025d9c54759dcf51cbd577c2f511996f289df4d00f2b722b0812d951e7f370ba881e65b1fc3649039720bccd93c75e6edb5066a477170d673bd0643b34bd689c30feb863ee34c4d7918ead31bea094f6126e", 0xe5}, {&(0x7f0000000140)="0cf0afab54f9c7cc4fdd3481ba1ae2168ee67af4ce6d7c24c5707eb8c14bf4c998684a9bf0de606f536c13d45217c5f39533ea15a873d5f913437a6313323df31eae841654bbf6cf32", 0x49}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="ded3884d6bea54177fbe6011f7444b0b41f1dd1e286284d51793b9a419153ed8e2f44dcdbc441cf719af29e5bd0a5545676029889db4500de1d1bd96b19dce", 0x3f}, {&(0x7f0000000440)="3cdb2020e8ab514af53091ea6c474f2deca4a36884e72b741b56e6db4445db88782ba38db493ca26a4c85c9e36caf95c285eb9b93cbc6a2050f55ab687e1087c4a73b0a3ab1f", 0x46}], 0x8}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x1d, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='wlan1\x00') 10:54:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:33 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffebb, &(0x7f0000000100)}, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xfa, "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"}, &(0x7f0000000000)=0x102) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000040)={r2, @in6={{0xa, 0x4e23, 0x8, @remote}}, 0x2, 0x3, 0x7ff, 0x1, 0x3c0af57c}, &(0x7f0000000140)=0x98) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x1d, 0x4) socket$pppoe(0x18, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='wlan1\x00') recvmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)=""/90, 0x5a}], 0x1}, 0x80}, {{&(0x7f00000003c0)=@xdp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000440)=""/166, 0xa6}], 0x1, &(0x7f0000000540)=""/14, 0xe}, 0x5}, {{&(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/107, 0x6b}, 0xaf}], 0x3, 0x0, 0x0) 10:54:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) close(r0) sendmsg$unix(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40, 0x721000) read$FUSE(r2, &(0x7f0000000740), 0x1000) 10:54:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") clone(0x2102009ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000740)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x1, 0x1a8, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x288) 10:54:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:34 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80, 0x800) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x4, 0x80000) write$P9_RLCREATE(r1, &(0x7f00000001c0)={0x18, 0xf, 0x1, {{0x8, 0x0, 0x8}, 0x3}}, 0x18) getpeername$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000600)='cgroup\x00', 0x0, 0x0) 10:54:34 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x200001) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x4000000) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd6, 0x0, 0x0, 0xffff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000000c0)=""/10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000013c0)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001380)={&(0x7f0000001240)={0x118, r3, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0xe8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5cf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a5}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x1}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001140)={&(0x7f00000c2000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000172000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000229000/0x2000)=nil, &(0x7f0000935000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00005d1000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r4, 0x4b67, &(0x7f0000001580)={0x5, &(0x7f00000014c0)=[{0x4, 0x9}, {0x1, 0xef90}, {0x1, 0xb5}, {0x6a9, 0x800}, {0x200, 0x7}]}) fcntl$getown(r2, 0x9) readlinkat(r0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)=""/253, 0xfd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001440)={0x0, r0, 0x0, 0xc, &(0x7f0000001400)='/dev/amidi#\x00', 0xffffffffffffffff}, 0x30) gettid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001480)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={0x0, r1, 0x0, 0xd, &(0x7f0000001500)='user}cgroup&\x00'}, 0x30) gettid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)=0x0) ioctl$TIOCCONS(r1, 0x541d) r8 = syz_open_procfs(r7, &(0x7f00000015c0)='attr/sockcreate\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000017c0)={r6, r2, 0x0, 0xc, &(0x7f0000001780)='/dev/amidi#\x00', r5}, 0x30) r9 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r9) read$FUSE(r8, &(0x7f0000000140), 0xfffffefa) 10:54:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x2, 0x2}, 0x14) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0xf, 0x2}]]}}}]}, 0x38}}, 0x0) [ 1974.862850][ T2568] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 1974.887506][ T2571] netlink: 'syz-executor.0': attribute type 15 has an invalid length. 10:54:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfcff, @ipv4={[], [], @dev}}, 0x1c) 10:54:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:34 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x980, 0x40) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x101000, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000100)={0xa39aed74e9f436a9}) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711, @host}, 0x10) r2 = memfd_create(&(0x7f00000001c0)='\x00', 0x3) fcntl$addseals(r2, 0x409, 0xd) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) r3 = open(0x0, 0x200001, 0x10) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000640)) pipe2$9p(&(0x7f0000000040), 0x80000) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f00000003c0)=ANY=[@ANYBLOB="31ce586d810084c7db77a1a3b876ff9665e406545b1fef62ba00737dad2b031ea12dbb277c6f00de4cfc0e72b7968b6b254041c39da84bc77238149ae611937ef241077024659663d18f49263a7faf8868916ed443061930401ed89b8427d27a30378ecf59a85e3ab42ef8b6748c7ae587063a53cfe2ed2f3d14e5b4ad96c6e030d5083d89ff3841e392e736ccd40cc380c3f5a98afadb29c546a70e57af3b3cf09bf02a62a1dbfda6ee23cab417086ee2b1d9afbc684365d8b0bb572592f3fb7c188beb36a03a65d0df62174bd9519dcc18058416b06289cc"]) getrusage(0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) unshare(0x40000000) [ 1975.078949][ T2582] IPVS: ftp: loaded support on port[0] = 21 10:54:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x63f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x72, 0x40080) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x25fa) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 10:54:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x640}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:34 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f00000001c0)=0x78) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@nfc, 0x20000080, &(0x7f00000000c0), 0x23b, &(0x7f0000000100)}, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x40) 10:54:34 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getdents64(r0, &(0x7f0000000200)=""/163, 0xa3) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000080)) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0xfff}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000001c0)={r3}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_int(r1, 0x29, 0x2d, &(0x7f0000000500), &(0x7f00000004c0)=0xfffffffffffffed3) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000400)={0x6, {0x45d, 0x9, 0x8c3d, 0x4}, {0x8, 0xfff, 0x9e, 0x1000}, {0x0, 0x58939365}}) accept(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000140)=0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) close(r2) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000380)={0x7985, 0x9}) accept4$inet(r5, &(0x7f0000000440), &(0x7f0000000480)=0x10, 0x80000) 10:54:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:34 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xc001}]}}}]}, 0xfffffffffffffeff}}, 0x0) 10:54:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x641}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:35 executing program 4: lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f0000001600)=@v2={0x7, 0x2, 0x6, 0x5, 0xf0, "a821a7b840ddbef0b6f00b3e07e7fbe09966dd0835baa617cc661d04e0caf112e91173f88a377ea30867667e4e5ef87597d90beee4940172fd1be210ec10f9fb9b1a8956d7af22c168f0e633a7be24cae0fde476069624d2e7ae989c97b67bd25e2f74027310f2dda4ce6628497b7a62d05cef3fa81e3bdce526958582734877e63eee9eea4d63381f83434beaa31dbf759703016f6d8dac3443e8d1aa1793106111ddf9e5f1b562386976e3f2e903df9e6bb837a04e176365c411fe61c44ce0473f1c27814719600eeab4702146c6851579661916c38bc9041ea01c70f6c61cd72dd547de9f2934f46873f2b2f2adf7"}, 0xfa, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0x80, 0x0, 0x209}}], 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/softnet_stat\x00') preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f0000001500)=""/228, 0x334}, {&(0x7f0000000200)=""/94, 0xe}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000280)=""/67, 0x43}, {&(0x7f0000000480)=""/4096, 0x1000}], 0xfffffffffffffca, 0x63) 10:54:35 executing program 0: capset(&(0x7f0000000180)={0x19980330}, &(0x7f0000000200)) r0 = getpgrp(0x0) capset(&(0x7f0000000080)={0x20071026, r0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x8}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000001c0)) getrusage(0x0, &(0x7f0000000300)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000100)) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="32000000030000000000000000000000020000000000000011000000000000002f6465762f76686f73742d76734f636b0000"], 0x32) 10:54:35 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfe80, @ipv4={[], [], @dev}}, 0x1c) 10:54:35 executing program 1: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='\x00\xaf1\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfew\xe4\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xc9\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\x1c\n\xb0@mns\x8el\x9b{2\xa7 h\xc7\xac\xfa\xd9!pR\xa8\xcaY%%\xb0\xbc\x85\xd1\x13R0\x94\xeb4\xf3\xb1\xd33\xca*q\x1f\xf6\xc79nUy:\xc2Aw\xf2\xecj\x81\x85\xecW\x17h\x84\xbav\xbd\x0fz\x1bN\x8a\xb1\xf7%\x7f~E\r\xe6\x94\xec\x84\x1dv\xd6\v$\xf3\x18\xc2\xe5H\xd0\xd7\xa7\xb0\xc8\b\xc0\x19\xe2$|\xd31m\x8a\xb2\xd3\x15\xe9\xbaiM\xef\xf9\x9b7\xf3\x1a\vo\'f\v\x14\x84~\xf4\'s6\x18\x9e\xd6\xb43r\xe50\xe3\x84\xf5\xea\xc2\xda\xcd\xfbX') r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='mem\x00aS.cur\x89\xc9J\x01\xe3\xfarent\x00\x00\x00\x00\x00\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000040)={0x5, 0x6, 0x9, 0x80}, 0x10) 10:54:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x642}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x361, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xa, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44081}, 0x80) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000240)=0x2) 10:54:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x643}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="b3472d1783854b94b445af6046e27335", 0x10) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 10:54:35 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x40) sendmmsg$alg(r0, &(0x7f0000005740)=[{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f00000000c0)="05f7fbd45f842a0135081b1c921500c35b75af3386dcb4d15ee48ee19f24d40ddce1a6ac4f3aada8420e6e3ab0a131f25e33e1460a7ed686187f4aa0e762a003619394afd062ad010cc0b1ad23a6548628614c3f289d538c06e7273c7c7bd468dd04b7db55dc2090bb2ffb57a8be0bc1b414da70e767f62c07304b0ceb43f0901ebdd3cf6826fe2e6f4ced5a65c7bf837972b05ccea9be4eec39ffb31c17bfd3f93491012d315b3ca4a0bbbd2df19c001cda67dbf870aae66bd91b6bff4fb69689e382137eb127803f56", 0xca}, {&(0x7f00000001c0)="f7e41f7199e58d037f01bd27c7b239eae5d26a76d299bb213de5256724588c345c356ba31a7c41087b8ffd747568213d1b166c40a8762d46e46f49d32f491c2f0bab31cb77f416b66f713bfa30a436a6e8edb0e51cdea019ba8373f628c58bc6162b6a31aec85445ebd16324146d9dafb21442e53cd8afac33c851007a50a78f260bbf3e3e", 0x85}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="574282593f02a2814255ca0d7d70263458dafed2ca55c596c6178597695c9eae1943e6bb7538397a97213fe849a73e9f001bcb8a8a97a117506f4911af4a06ca708596b1dcd583efdf08e0dfa415fb65fc132031a2389463a00f8fdb07fff70774e55214435c5cca10e44f980afe20420a16d9ab708618a30be3eeec5e9564b5cf7096a182ea659d69b8c4551017260f6c734acdbeb8be4bed", 0x99}], 0x5, &(0x7f00000023c0)=ANY=[@ANYBLOB="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"], 0x1270}, {0x0, 0x0, &(0x7f0000004680)=[{&(0x7f0000003640)="72068533b2bbe6953c4bc0", 0xb}, {&(0x7f0000003680)="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", 0x1000}], 0x2, &(0x7f00000046c0)=[@iv={0x50, 0x117, 0x2, 0x3b, "c0b37583b3e0e23cb4249ee1584128c03cc15ae7556ba06600a84491d4e759cb3f966b41d4b2a5f6ba41c7f90be9ea185b3bb4d73c7a712472978c"}, @op={0x18}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1080, 0x8040}], 0x2, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000005800)={0x0, 0xee, 0x401, &(0x7f00000057c0)=0x2}) ioctl$CAPI_GET_SERIAL(r1, 0xc0044306, &(0x7f0000000080)) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000005840)=""/243, &(0x7f0000005940)=0xf3) 10:54:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x644}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:35 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) quotactl(0x5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f00000004c0)="c1adb1567bdac386e6ccf1afec589d64ff0d2134f358cb053737090921d8d26200fe2b27c56f8c9ae2a9ccaa2deb") setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000500)={@dev={0xac, 0x14, 0x14, 0x26}, @dev={0xac, 0x14, 0x14, 0xa}, r2}, 0xc) write$apparmor_current(r0, &(0x7f0000000540)=@profile={'stack ', '\x00'}, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000580)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000005c0)={0x2, r4}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000600)={0x0, 0xad, "2d8e9881e03d884a908c1825b7674a7df12d936621c99d22b2588ed91fc25ca3bf606575810bdcedfaff2284829dd4f4848e59b746f8c6e80fee148eb0b34058f92580551f64a8cf90b1779f5b84d764a2d546e49e8902233dc298e06b902c1c2c06f7c592f5f369909bc46b171cde786c9f5ba6d259b2477fd67d9dbd7e5d1aea4d1ff75b567809024db4f10ec1e526d5ab721b45a4882cac595b43fc6b287c28a763f040578cb06ad8a1f72b"}, &(0x7f00000006c0)=0xb5) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000700)={r5, @in6={{0xa, 0x4e24, 0xf6ce, @remote, 0x1}}}, 0x84) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000007c0)=0x4) setsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000800)=0x7, 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000840)={r5, 0x7}, 0x8) r6 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000880)={[0x9, 0x8000, 0xfe, 0x10000000000, 0x87d, 0x0, 0x7ff, 0x77, 0x5, 0x1, 0x0, 0xb3c, 0x8, 0x3, 0x160, 0x7]}) setsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000940)=0x80000001, 0x4) splice(r0, &(0x7f0000000980), r6, &(0x7f00000009c0)=0x2f, 0x8001, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000a00)={0x1, [0x0, 0x100000000, 0x54, 0xd4, 0x4, 0x20, 0x5, 0x6, 0x1ff, 0x7f, 0x300000000000000, 0x0, 0x4, 0x3, 0x401, 0x10001, 0x3f, 0x400, 0x401, 0xdbd, 0x6, 0x0, 0x9, 0x8, 0x6, 0xfffffffffffff001, 0x3ff, 0x9, 0x7, 0x6, 0x401, 0x4, 0x7f, 0x8, 0x851, 0xf0, 0x1, 0x1, 0x100000000, 0x6, 0x7ff, 0x6, 0xfffffffffffff000, 0x80, 0x3ff, 0x1, 0x6, 0x1], 0xa}) fcntl$setflags(r6, 0x2, 0x0) ioctl$NBD_DISCONNECT(r6, 0xab08) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x10001) exit(0x3) r7 = geteuid() quotactl(0x4e9e, &(0x7f0000000a80)='./file0\x00', r7, &(0x7f0000000ac0)="77c251bd9ee50fc10764910f6c0190e50cea1a46358dc2dfc03d241c553ea3286cc1cdad52a5a12b56dec92ecbe04cdc3b56f912ff9251b0838b5cacaca0c1edc72199aaef11ebefb23402cbcbefd72cae49655904586bdf99407809ef773c03653b34c35287c7258af2b01475a7743cb231c9c6eb") ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) 10:54:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2b, 0x0, 0xffffffffffffff2a) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8108551b, &(0x7f0000000180)) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x3}, 0x8) readv(r0, 0x0, 0x0) 10:54:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfec0, @ipv4={[], [], @dev}}, 0x1c) 10:54:36 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@routing, 0x8) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 10:54:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x645}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2b, 0x0, 0xffffffffffffff2a) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8108551b, &(0x7f0000000180)) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x3}, 0x8) readv(r0, 0x0, 0x0) 10:54:36 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/uts\x00') r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x101000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x8000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=@newtclass={0xfc, 0x28, 0x800, 0x70bd27, 0x25dfdbfe, {0x0, r1, {0xfff1, 0x6}, {0xffff, 0x5}, {0xfffb, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x0, 0x2}}, @TCA_RATE={0x8, 0x5, {0x200, 0xfffffffffffffffe}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x14, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0xffffff8000000000, 0x1, 0x4, 0x7, 0xffffffff}}]}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x44, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x9}, @TCA_QFQ_LMAX={0x8, 0x2, 0x4}, @TCA_QFQ_LMAX={0x8, 0x2, 0x8}, @TCA_QFQ_LMAX={0x8, 0x2, 0xfffffffffffffffa}, @TCA_QFQ_LMAX={0x8, 0x2, 0x1}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0xd8a9}, @TCA_QFQ_LMAX={0x8, 0x2, 0x1}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0x10000}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0xc, 0x2, [@TCA_ATM_FD={0x8, 0x1, r2}]}}, @tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_VALUE={0x8, 0x5, 0x7f}}}, @TCA_RATE={0x8, 0x5, {0x1ff, 0x4}}, @TCA_RATE={0x8, 0x5, {0x1, 0xfffffffffffff801}}, @TCA_RATE={0x8, 0x5, {0x9}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x14, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x1ff}, @TCA_QFQ_LMAX={0x8, 0x2, 0x7}]}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x80) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r3, 0x102) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x143002) faccessat(r5, &(0x7f0000000080)='./file0\x00', 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x208002, 0x0) sendmsg$TIPC_CMD_GET_NODES(r5, 0x0, 0x4000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 10:54:36 executing program 4: r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000180)={@val, @void, @eth={@random="7bbff22e7865", @dev, [], {@llc_tr={0x11, {@snap={0xaa, 0xaa, "d207", "913530", 0x88fd, "ee26fed2054e47de311f0e6e5e61d2d4c377a5804eaede8e6f8b7fad95c15136097a9a27e741b7ab016290ce81b4914b9e65ba238e31224dc291aa5de0b0a769a3130b955001699485f19439683078846fa8788b0f7ad0221a445ea78d853fab095c54e12ce3ea4106ff15471afd075a06ec1b867d4ba2c9e728de53c1f903bc21a07af93bd8470635282f0ec9f7e4545137766ca9bc373f3bf11bba0dcedbdb940295ea071d40be"}}}}}}, 0xc3) 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000a7aff6)='./control\x00', 0x0) symlink(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='./control\x00') 10:54:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$VT_ACTIVATE(r0, 0x8924, 0x714fff) 10:54:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x646}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 10:54:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xff00, @ipv4={[], [], @dev}}, 0x1c) 10:54:37 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x647}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:37 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000240)="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", 0xfc) 10:54:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:54:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$VT_ACTIVATE(r0, 0x8925, 0x7fffffffefff) [ 1978.030880][ T2741] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x7) ioctl$VT_ACTIVATE(r0, 0x8910, 0x715000) 10:54:37 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\x00\x00\x00\x00\x00\x00\t0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1025, 0x0) 10:54:37 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x648}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1978.264776][ T2755] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000040)={'ip6_vti0\x00\x00\x01\xf9\xde\a\x00'}) 10:54:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x84000200}, 0xc) r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 10:54:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 10:54:38 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfffc, @ipv4={[], [], @dev}}, 0x1c) 10:54:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:38 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x649}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:38 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000180)) 10:54:38 executing program 4: 10:54:38 executing program 0: 10:54:38 executing program 4: 10:54:38 executing program 0: 10:54:38 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:38 executing program 0: 10:54:38 executing program 1: 10:54:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001300)=0x7ff, 0x4) r2 = socket$packet(0x11, 0x0, 0x300) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x80000000, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0x7d0}], 0x1}, 0x0) 10:54:39 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000)=0x8000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000001140)='./bus\x00', 0xfffffffffffffffb) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000001100)={0x0, 0x74420}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_open_procfs(0x0, 0x0) 10:54:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:54:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x1414ac, @ipv4={[], [], @dev}}, 0x1c) 10:54:39 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x800000800000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 10:54:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:39 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1979.895535][ T2831] ptrace attach of "/root/syz-executor.4"[2830] was attempted by "/root/syz-executor.4"[2831] [ 1979.955616][ T2825] kvm [2824]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f [ 1979.974270][ T2825] kvm [2824]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f [ 1979.985603][ T2825] kvm [2824]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f 10:54:39 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="5500000018007f1dfd0000b2a4a280930a80000000a84308910000000e0008000a000c00060000001940a30700000000000000001338d52f4400009bfb83de448daa7227c43ac9220000010cec4fab91d400000000", 0x55}], 0x1}, 0x0) [ 1979.996540][ T2825] kvm [2824]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f 10:54:39 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) [ 1980.113416][ T2845] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.4'. 10:54:39 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:39 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x880, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0xff, r1, 0x1, 0x2, 0x6, @local}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f00000000c0)={@broadcast, @multicast2, @rand_addr=0x1}, 0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x7a, "5b572325b11cc1a59837668eecdca050175c49836c90897d23f3b069b4007620280f2c08dfd16c7ed149ed1f0fa61ec2db53f3b5a9e67cecf9970fd1a7e7a652057a41a6dd3d32bf877aec6081871f64023565a90695af38645718a767ae4c4055623a0428765cbdddc9ca254c08d02fa3859fa25911a694d50a"}, &(0x7f00000001c0)=0x82) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000200)={r2, 0x7, 0x75, "cb105aad14096d31a346b863f058a7fa36479fd8feb44c832f3f831af165353530b2f37daf2184a002feb3e6bda2643b8a023695d7d19157797eb4e595081a24f5b1b44c93fbfa34cebbed4b6f99279d4523fd237c0b807c46110387b656b4cab9c9535c6adc7c951db4c5852516a9046b06bee66a"}, 0x7d) socket$rds(0x15, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0x1, @mcast2, 0xfff}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x92d, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x1, @local, 0xb6f}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x8}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0xb03, @local, 0x6}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x4, @local, 0x6}, @in6={0xa, 0x4e20, 0x8, @local, 0x8773}], 0xe8) write$tun(r0, &(0x7f0000000380)={@val={0x0, 0xf5}, @void, @ipx={0xffff, 0xcd, 0x9, 0x14, {@current, @current, 0x5}, {@broadcast, @broadcast, 0x7}, "d31dbfd1fb11466dda42bdb30f86f08d337493172d2aceabe2def16f4aa6adb91e93952d08d40e7c5d93029b5a7eb43a4ca6dfb947bc3f58ede3ff50c0651746a70e7d205b5adb475eb0e1147deb09d625f40792038ed096c788769817de376dceadc67563e252e3ddd77529b2e2231b6cc453a0cbb5baa96251a2762261d0d2675168ad87cdeeec80ce09734ff41b62e94160ce732378acd22784143fe8eca1f06341c3d7446f8afa0034d066b9b6"}}, 0xd1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000480)) r3 = dup(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='net/route\x00') r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000540)={{0x2, 0x4e22, @multicast2}, {0x306, @random="620c7003c95d"}, 0x18, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bond0\x00'}) r6 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x8, 0x80400) ioctl$VT_RELDISP(r6, 0x5605) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000640)={&(0x7f0000000600)=[0x0, 0x0], 0x2}) recvmmsg(r3, &(0x7f0000005b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)=""/202, 0xca}], 0x1, &(0x7f00000007c0)=""/8, 0x8}, 0x8000}, {{&(0x7f0000000800)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000880)=""/126, 0x7e}, {&(0x7f0000000900)=""/223, 0xdf}, {&(0x7f0000000a00)=""/37, 0x25}], 0x3, &(0x7f0000000a80)=""/45, 0x2d}, 0xffffffffffffffff}, {{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/178, 0xb2}, {&(0x7f0000001c00)=""/34, 0x22}, {&(0x7f0000001c40)=""/156, 0x9c}], 0x4, &(0x7f0000001d40)=""/4096, 0x1000}, 0xdf92}, {{&(0x7f0000002d40)=@isdn, 0x80, &(0x7f0000003000)=[{&(0x7f0000002dc0)=""/1, 0x1}, {&(0x7f0000002e00)=""/245, 0xf5}, {&(0x7f0000002f00)=""/243, 0xf3}], 0x3, &(0x7f0000003040)=""/70, 0x46}, 0x3}, {{&(0x7f00000030c0)=@ipx, 0x80, &(0x7f0000003440)=[{&(0x7f0000003140)=""/35, 0x23}, {&(0x7f0000003180)=""/98, 0x62}, {&(0x7f0000003200)=""/69, 0x45}, {&(0x7f0000003280)=""/65, 0x41}, {&(0x7f0000003300)=""/119, 0x77}, {&(0x7f0000003380)=""/166, 0xa6}], 0x6, &(0x7f00000034c0)=""/219, 0xdb}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000004640)=[{&(0x7f00000035c0)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/88, 0x58}], 0x2}, 0xecf}, {{&(0x7f0000004680)=@nl=@proc, 0x80, &(0x7f00000047c0)=[{&(0x7f0000004700)=""/182, 0xb6}], 0x1}, 0x80000000}, {{&(0x7f0000004800)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000004900)=[{&(0x7f0000004880)=""/65, 0x41}], 0x1, &(0x7f0000004940)=""/115, 0x73}, 0x1}, {{&(0x7f00000049c0)=@nl=@unspec, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004a40)=""/199, 0xc7}], 0x1, &(0x7f0000004b80)=""/4096, 0x1000}, 0x8}], 0x9, 0x21, &(0x7f0000005dc0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000005e00)={r2, 0x4}, &(0x7f0000005e40)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000005e80)={0x32}, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000005ec0)={0x8, 0xfffffffffffffffb, 0x6, 0x3ff, 0xe54}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000005f00)={'veth0_to_bond\x00', 0x5}) ioctl$void(r3, 0x5451) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000005f40), &(0x7f0000005f80)=0x4) membarrier(0x10, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000005fc0)={"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"}) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f00000063c0), &(0x7f0000006400)=0xb) prctl$PR_SET_KEEPCAPS(0x8, 0x1) [ 1980.212319][ C1] net_ratelimit: 26 callbacks suppressed [ 1980.212326][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1980.212377][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1980.218189][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1980.235682][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1980.242238][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1980.248081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1980.254005][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:54:39 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1980.302304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1980.308222][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1980.314246][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:54:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80340000005e510befccd7", 0x2e}], 0x1}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000100)=0x4) 10:54:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x1000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:40 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x64f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r2 = getuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {0x1, 0x3}, [{0x2, 0x3, r2}], {0x4, 0x5}, [{0x8, 0x0, r3}, {0x8, 0x2, r4}, {0x8, 0x1, r5}], {0x10, 0x1}, {0x20, 0x2}}, 0x44, 0x3) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl(r1, 0xfffffbfffff3ffa7, &(0x7f0000000140)) [ 1980.775714][ T2878] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 10:54:40 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x650}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:40 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x651}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1980.974028][ T2878] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 10:54:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x5}, 0xfffffffffffffc97) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e20, 0x10001, @remote, 0x7}, {0xa, 0x4e21, 0x3ff, @local}, 0x6e, [0x5, 0x70c, 0x1, 0x31e252a0, 0x8001, 0x2, 0x4, 0x401]}, 0x5c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/llc\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000240)="4ba6d409e2b83da19ad34db91fbba099dcd85a023f0d882f3d6a742b2b02ffd00d25f3866e619dd1e77d169b93e130ff90dd3f6285fed39e68da89cc9e093d1c06b0a7c879e49919265dbab590a9a524776b664701b6581c625e8e0dffcfb88d5d8ca7916c0c5f53a73ba076bf306aeebd657b6112a88b5acfd5b6f0d77e3cba2240afb6998a93d78f116333b7541434b980762264ee4f4c151fe9c7083749bddcdba5c09bb513e8cd0f701e795e419158a6e628d6a7df7b99656dabcbb699bf98fdd4acc6b1c90fff57eab83ce0a92a99805c830c3cc035c757e0533fde4fcc0410783980b80cea92", 0xe9, 0x40, &(0x7f0000000080)={0x11, 0x1b, r2, 0x1, 0x8000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) r3 = fcntl$getown(r0, 0x9) fcntl$setown(r0, 0x8, r3) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4000000000001a6, 0x0) 10:54:40 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x652}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1981.022078][ T2883] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 1981.059971][ T2883] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 10:54:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1000000000000005, 0x84) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x10000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, 0x0, &(0x7f0000000040)) 10:54:40 executing program 0: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) socket$inet6(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0xc, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) r4 = fcntl$getown(r3, 0x9) ptrace$setopts(0x4206, r4, 0xc4a, 0x20) pwritev(r2, 0x0, 0x0, 0x20) times(&(0x7f0000000000)) pwritev(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)="63c6c7ee1c03812c305cbe4210681d42f05529c771c162de53956ac7d99fc89cde2ffb4c667f94d355f1ae2d2fa93cc232505370d18c99412bf2376b837afda5d6bcfad39b606520acd866dcb23b3c8c15e85059c43f4f062eff1bd356ef747740761e56e1e86bab798e96a6d8cb29935c9caeaa1887c4e8bd9a7a7c3d1b68ac23f1330f8465bc432b81dd87fb904618bc040d418b58abdf3370258614c3", 0x9e}], 0x1, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="e40000002901000100000006030000000500000000000000040000000200000000adc8971a020615b99dc200000000f5b4c07d44999c1cfc535236349600000000000000000000007f07002e2f66696c65300002000000050050030000000003006c65302002000000040000000000000000000080000000000007002e2f66696c653040020000000800000000000000010000831969b82ed9aeea2e2f66696c25300c0300000002000000000000000000080001000000f807002e2f66696c653000009997013500000000000000040000000007653000"/230], 0xf5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x2000010200000e) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@loopback, @multicast1}, &(0x7f0000000100)=0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000000c0)) 10:54:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r0, r1, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x46, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='lo:\x00\xff\x05\x00\xf2\xff\xff\xf8\xff\xff\xff\xff\x00'}) 10:54:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) [ 1981.296033][ T2916] QAT: Invalid ioctl 10:54:40 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x653}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1981.329152][ T2916] QAT: Invalid ioctl [ 1981.409619][ T2921] QAT: Invalid ioctl 10:54:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:41 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x103001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) r2 = getpgid(0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xd961, 0x800, 0x3, 0x9, r2}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="0bf5430f0003b8", 0x7}], 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x32e, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x2, 0x3, 0x7fff, r3}, &(0x7f0000000200)=0x10) 10:54:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x12) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0x4008ae48, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) 10:54:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:41 executing program 0: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x800, 0x0) setrlimit(0xf, &(0x7f0000000040)={0x71, 0xffffffff}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/243, 0xf3}], 0x1) 10:54:41 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x654}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @remote, 0x9}, {0xa, 0x4e22, 0x1, @remote, 0x800}, r1, 0x6}}, 0x48) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x20000, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x111100) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @rand_addr=0x7fff}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x8, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @rand_addr="3ce6cdf9e7ed9b2932ae2d2c5d520e2a"}}}, 0x48) timerfd_create(0x3, 0x80000) 10:54:41 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x655}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008902, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) 10:54:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000004c0)=""/178) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) 10:54:41 executing program 1: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000004c0)={0x0, 0x0, {0x400000002, 0xffffffffffffffff, 0x2, 0x3f}}) fcntl$setsig(r0, 0xa, 0x41) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x40800, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000040)={r3, 0x2}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f00000001c0)=""/214) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f00000002c0)={0x40, {{0xa, 0x4e24, 0x1ff, @mcast2}}, {{0xa, 0x4e24, 0x14810f1d, @rand_addr="d7ac2c5af824548f2320fba68d7640aa"}}}, 0x108) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000400)=0x8000, 0x4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@rand_addr="332d6bcb6ca3da4432139d8ab3e4fd7b", 0x10001, 0x3, 0x0, 0x4, 0x7fff, 0x4}, 0x20) write$FUSE_STATFS(r2, &(0x7f0000000440)={0x60, 0x0, 0x8, {{0x7, 0x0, 0x1, 0x0, 0x53e, 0xffffffff00000001, 0x1, 0x8}}}, 0x60) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000500)={0x10000, 0x1f, 0x7, 0x0, 0x0, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, &(0x7f00000005c0)="0f18e60f01b808002e0f01cf0f239f66b9800000c00f326635008000000f30baa000edba2100ec66b9020a000066b87a8b000666ba000000000f30f30f092e0fc7a90000", 0x44}], 0x1, 0x0, &(0x7f0000000680), 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, 0x0) syz_open_dev$media(0x0, 0xfffffffffffffffd, 0x101004) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x40084503, 0x0) 10:54:41 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x656}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x4000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:42 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sco\x00') setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20015010}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x204, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x840) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000300)=0x400, 0x4) 10:54:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x280800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x1, 0x201, 0x1, 0xffffffffffffff0b, 0x4, 0x3ff, 0x101, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000200)=r2, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x408001, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0) membarrier(0x2, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x8, &(0x7f0000000080), 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) 10:54:42 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x657}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=@random={'osx.', 'EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, &(0x7f0000000180)=""/73, 0x49) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x24, 0x0, 0x0, 0xd0600900}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 10:54:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2d, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="006340400000000000000000000000000000000000000000000000000000000000000000180000000000000008"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) 10:54:42 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000002c0)={0x30}, 0x30) 10:54:42 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x658}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:42 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x659}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1982.969645][ T3002] binder: 3001:3002 got transaction with invalid data ptr [ 1983.006853][ T3002] binder: 3001:3002 transaction failed 29201/-14, size 24-8 line 3180 10:54:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000280)='ifb0\x00', 0x0}, 0x30) r2 = getpid() r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x2000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, r3, 0x0, 0xfffffffffffffea9, &(0x7f00000003c0)='/dev/net/tun\x00', r1}, 0xa1201235) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000100)={0x16}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) 10:54:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) [ 1983.082114][T12963] binder: undelivered TRANSACTION_ERROR: 29201 [ 1983.131866][ T3002] binder: 3001:3002 got transaction with invalid data ptr [ 1983.194964][ T3002] binder: 3001:3002 transaction failed 29201/-14, size 24-8 line 3180 [ 1983.220091][ T7820] binder: undelivered TRANSACTION_ERROR: 29201 10:54:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:43 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) bind(r0, 0x0, 0x0) 10:54:43 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) timer_create(0x7, &(0x7f0000000080)={0x0, 0x23, 0x2, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000100)={{}, {0x0, 0x1c9c380}}, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000200007041dfffd946f610500020000201f000002002808000800040004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:54:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0xfb0, &(0x7f0000000040)=0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000280)=0x7f) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) io_submit(r1, 0x1, &(0x7f0000001440)=[&(0x7f0000001340)={0x0, 0x0, 0x0, 0x8, 0xffffffffffffd508, r2, &(0x7f0000000340)="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", 0x0, 0x10000, 0x0, 0x2, r2}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x7, 0x8000, r2, &(0x7f0000001380)="b1d729dba374b9a8b5a60908f3512813fc704a45798cc17da8a27ca7846efdeb962d1a7e8dd83d6504c3c698009cc3589d5f783b1f18b741805470187c068cde1486edea06a6313d9fa3f48dd868b5c40295befe3da7ddb253b5db436f04c14924da4364575d751ad920257da15bbcad80cd9ac9c715b6cae7a310", 0x0, 0xcbe, 0x0, 0x1, r2}]) r3 = syz_open_dev$mice(0x0, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x2) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000180)={0x13}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 10:54:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) faccessat(r3, 0x0, 0x100000000000000, 0x8100) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r5) 10:54:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x79, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00200a79e9f36758d7396805cd57716571410000"], 0x8) 10:54:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000140)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x5, @local, 0xffffffff}}, 0x800, 0x7fff}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000380)={r3, 0xffffffff00000001}, &(0x7f00000003c0)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x4, 0x80, 0x3, 0x4000000000000000, 0x0, 0xfe4a, 0x5, 0x9, 0xf8fe, 0x101, 0x8001, 0x141}) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x20) connect$l2tp(r4, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x2, 0x3, {0xa, 0x4e20, 0x4000400, @rand_addr="6c51234bb54b10aadeeee25dc5454f03", 0x80000000}}}, 0x32) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x3) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000400)=""/243) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) 10:54:43 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:43 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @random="015248b3a95b", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xff, 0x4000) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) 10:54:43 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40104, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x100000000}, &(0x7f00000001c0)=0x7) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x1}, &(0x7f0000000100)=0xfffffe2e) pwritev(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/pid_for_children\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x28020400) syz_open_procfs$namespace(r2, &(0x7f0000000100)='ns/pid_for_children\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x3, 0x8000000000000007) write$nbd(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getresuid(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r4, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x0, 0x2, @dev}, 0x1c) getegid() r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r5) socket$unix(0x1, 0x5, 0x0) 10:54:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x7000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:44 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:44 executing program 4: syz_open_procfs$namespace(0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x102) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x200000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000180)=""/252, 0xfc, 0x4, 0x401, 0x3, 0x81}, 0x120) r2 = socket$inet6_sctp(0xa, 0x8, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000000)=0x68) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0xa3, 0x0, 0xbe954fda36c78544, 0xf, 0x803, 0x5}, 0xfffffffffffffcb3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 10:54:44 executing program 1: r0 = socket$inet(0x10, 0x3, 0x200) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x1) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000200)) syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x80000000, 0x40) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-control\x00', 0x200000, 0x0) syz_open_dev$radio(&(0x7f0000000800)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_open_dev$sndpcmc(&(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', 0xa5d9, 0x400040) r3 = openat$cgroup_ro(r2, &(0x7f00000006c0)='memory.stat\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x8800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) r5 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x10010, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000380)={0xac, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {{0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x20, &(0x7f0000000140)=[@fda={0x66646185, 0x5, 0x4, 0x3b}, @flat={0x736a2a85, 0x1, r4, 0x2}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}], &(0x7f00000001c0)=[0x0, 0x18, 0x40, 0x0]}, 0x200}}, @reply={0x40406301, {0x4, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x30, &(0x7f0000000200), &(0x7f0000000240)=[0x40, 0x48, 0x78, 0x0, 0x40, 0x0]}}, @acquire_done={0x40106309, r5, 0x3}, @increfs={0x40046304, 0x1}], 0x1c, 0x0, &(0x7f0000000340)="7daa28eb1968523b3094c7dc907de5ec63aa721413a9f436130c5137"}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 10:54:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) mknod(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0xae45, &(0x7f00000023c0)) 10:54:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:44 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:44 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1ae, 0x4000) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r0, 0x0, 0x3, &(0x7f0000000140)='lo\x00'}, 0x30) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_STD(r3, 0x80085617, 0x0) 10:54:44 executing program 4: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000006c0)={0x0, 0x0}) r0 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/dev/usbmon#\x00'}, {0x20, '*procvmnet1selinuxeth1)\xd1'}], 0xa, "8074e5b3a9e2fe6f1e69f445c600296d80a249d45c9c884081418dc7cddc0b096aba79835f4f8baa5cb7ddc4b7c45a0e693eb738437eaffc42603c35a2ca3a7632663936cec1c893b890e3170580859788cdb5cf65f0850f57e519a8f97d77f59339e94fa7cfccd7140883754e01f0692ee9dd9a6c65339d1e92b1246168a7bfa60bf8b405a9098d61d0105cfc73c057a6ac208d4fcd00f841ff646ce2085dfe206c7d213ce5c33d5844c2a88156cdbcac81ccf7675ae955f6a158f776b2fc4b38352d1d85bbc10c15124999fdbc8be8fa96676633ce81b21b280c7703"}, 0x10f) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x7, @ipv4={[], [], @empty}, 0x10001}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000400)={0x78, 0xfffffffffffffff5, 0x2, {0x3, 0x1, 0x0, {0x1, 0xfffffffffffffff9, 0x8, 0x1ff, 0x1000, 0x9, 0x50, 0x98, 0x100000001, 0x10000, 0x100, r2, r3, 0x8, 0x97ac}}}, 0x78) r4 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000002c0)={{0x73, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e22, 0x2, 'lblcr\x00', 0x1, 0x2, 0x6e}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x3, 0x8, 0x8, 0x2}}, 0x44) dup3(r1, r4, 0x0) 10:54:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140)=0x80, 0x4) r2 = socket$inet(0x2, 0x80001, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6, 0x100010, r0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000440)="0a721b49cfb455f06405cef0920eacd4baa026cc1c52e00d0bb7d5e664e09da0cf37d9668dc1127a3c00746c61d156fb1fe3b23784bc420277596a51b237d815c833bfd04d4ff9a7c37921") r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xa, 0x80) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x20003, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @rand_addr=0x2}, 0x8) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) readv(r6, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000380)=""/84, 0x54}], 0x4) readv(r4, &(0x7f0000001ac0)=[{&(0x7f00000004c0)=""/177, 0xb1}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f0000000580)=""/156, 0x9c}, {&(0x7f0000000080)=""/15, 0xf}, {&(0x7f0000000640)=""/170, 0xaa}, {&(0x7f0000000700)=""/235, 0xeb}, {&(0x7f0000000800)=""/145, 0x91}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/196, 0xc4}, {&(0x7f00000019c0)=""/247, 0xf7}], 0xa) 10:54:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="d3abc7990d535c000000004e00"/24, 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000000000000000c00000000000000000400"], 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x10) 10:54:44 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x8000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:44 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x65f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x3f, 0x100) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000500)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={'syz'}, 0x0, 0xfffffffffffffff9) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c81, 0x0) 10:54:44 executing program 1: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) connect$caif(r0, &(0x7f0000000080)=@dbg={0x25, 0x2, 0x7}, 0x18) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000002c0)={@mcast1, 0x74, r4}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x82000, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0xd187, @mcast2}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r3, r5, 0x0, 0x8000fffffffe) 10:54:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000040), 0x400000000000055, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x140, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)) 10:54:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x40000, &(0x7f0000000100)="7f1c5325d1e59c877d3d3272b3e33e862fb0a713950f843acdddf6860fb48becd7cef6d04908ba03f49d637988fdf6ede34bb4fec97203c5c60b929964a577dd26a7008bcd285f67f3b12a6371b90a6410b4b53cf85d28e61018e1559c633e659184d6f6a10cfc0ac242932bbc64b28a2c052d89c1ef57020d28f4a5de", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="814c0f23e535d5fc48e8308c7ddb6ae4c1405582b46f2fe0af39c0439a701b2948252d117703d06a516e17a00feb68d1634600113c08eebce84b8452606485c2a01c11316f69a9357be2493711e6d9d597de") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100040, 0x0, 0x0, 0x9b}, {0x80000006}]}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x10001, 0x40000) connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x1, @empty, 'ipddp0\x00'}}, 0x1e) sendto$inet(r1, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f00000003c0), 0xed5f0fde, 0x0, 0x0, 0x184) shutdown(r1, 0x400000000000001) 10:54:45 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x660}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:45 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) unshare(0x20400) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/vga_arbiter\x00', 0xc00, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000007700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007740)=0x14, 0x80800) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000007780)={@rand_addr="82d6be95868214a4cac1e742cfe45e4b", 0x78, r2}) r3 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000380)=r3) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x1, 0x4, 0x0, &(0x7f0000000080)={r4, r5+30000000}, &(0x7f00000000c0)=0x2, 0x8001) 10:54:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0)='keyring\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x1, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000280)={0x2, 0xfffffffffffffff9, 0x79, 0xfffffffffffffffe, 0x8, 0xde5}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='keyring\x00', &(0x7f0000000200)=@builtin='builtin_trusted\x00') 10:54:45 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x661}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:45 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x9000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x3, 0x6, 0x80, 0x8000, 0x68ea}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 10:54:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x20040, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) mknod(0x0, 0xfffffffffffffffc, 0x10000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsa(0x0, 0x1, 0x40000) sendmmsg(r2, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000000) listen(r1, 0x401) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, 0x0) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x700000000000000, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) 10:54:45 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x662}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xb6}, 0x3c) unshare(0x400) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101800, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0xfffffffffffffffe, 0xd21c}, 0x3c) 10:54:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) dup3(r0, r1, 0x80000) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) [ 1986.452273][ C1] net_ratelimit: 23 callbacks suppressed [ 1986.452282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1986.452319][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1986.458081][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1986.464004][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1986.469971][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1986.487305][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1986.493231][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1986.499070][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:54:46 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x663}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1986.532356][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1986.538308][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:54:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r4) 10:54:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1d, r0, 0x0) 10:54:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) dup3(r0, r1, 0x80000) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) 10:54:46 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x664}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfdf6) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x72, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) getsockname$unix(r2, &(0x7f0000000680), 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x200000002) write$vnet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r3, 0x40000000af01, 0x0) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)=""/132, &(0x7f0000000080)=0x84) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000007c0)=ANY=[]) write$vnet(r3, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xf7, 0x0, 0x0, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000f1dff8)={0x0, r4}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, 0x0) getrusage(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) unshare(0x40000000) 10:54:46 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xa000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:46 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x665}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:46 executing program 1: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000100)="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") ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/229) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f00000002c0)) 10:54:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') 10:54:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) dup3(r0, r1, 0x80000) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) [ 1987.389123][ T3264] IPVS: ftp: loaded support on port[0] = 21 10:54:47 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x666}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:47 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x667}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') 10:54:47 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x668}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') 10:54:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) [ 1988.011853][ T3316] IPVS: ftp: loaded support on port[0] = 21 10:54:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfdf6) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000008, 0x72, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) getsockname$unix(r2, &(0x7f0000000680), 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x200000002) write$vnet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r3, 0x40000000af01, 0x0) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)=""/132, &(0x7f0000000080)=0x84) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000007c0)=ANY=[]) write$vnet(r3, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xf7, 0x0, 0x0, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000f1dff8)={0x0, r4}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, 0x0) getrusage(0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) unshare(0x40000000) 10:54:48 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x669}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) dup3(r0, r1, 0x80000) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) 10:54:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) 10:54:48 executing program 1: r0 = eventfd2(0x5, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="e04a4f74b80de1fa", 0x8}], 0x1) writev(r0, &(0x7f0000002700)=[{&(0x7f00000002c0)="5565759488b04392", 0x8}], 0x1) read(r0, &(0x7f0000000080)=""/175, 0xaf) 10:54:48 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xe000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:54:49 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:49 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r3) 10:54:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffd, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) io_setup(0x9, &(0x7f0000000040)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d00, 0x4, 0x40000073, 0xd]}) 10:54:49 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1989.999810][ T3360] IPVS: ftp: loaded support on port[0] = 21 10:54:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) pipe(0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) mkdir(&(0x7f00000002c0)='./bus\x00', 0x20) r1 = inotify_init1(0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x7f, 0x8) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000440)='/dev/dlm_plock\x00', 0xf, 0x2) r3 = socket$inet6(0xa, 0x3, 0x6) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000040)={0x0, &(0x7f0000000280)=""/61}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000680), &(0x7f0000000640)=0x11) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x800000000000000, 0x2, 0x1}, 0x20) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="490000009b58277da5ac6c52becf15e06ae12ad5f723168d6536d60900000000000000de7f08861199e488cf80810f7e5c535a7264852f54c832ec208a82d493e49e8a93b8adba35ed31846bb5305e532e60897a78c2fc25d43d7b9b1f8cda56a5ece671651056555b3df15411b12dac100c55a68a31d2a5d6f16c25e73c8cd76c796ba2f2acda7cc9becfd9ee46c8669bc133ff18c2d35aae1168509aad0ee9ee955b6d4a7eb63e7b6b1b7add68a694231186a0f437dc9ee039b5983a6198a4ac8900eaf82fa501d278fa2b0000000000000000002bb78ec0be6bc0654fe3c4dcd2b9e2b8b07ea821eba01aa3ccd13a8aac7d5c4dff722674c237aff1412ca1ebfa66f62e2d090097c3242776cca4b3c62ec3dd1355fe12238c0798ea3ed2e4586068dd9e1f42428216feade6277ad12f7f5c808168f88a42a32b6e746362a447cfddd0921ec07880aca91a35aad791a545d830b9c8a19311c586c4b011cffe0c9d87145f42160b1842f7c883d99d7638b2b180c4d7801a4c6b5104e0bba4aaeb256965c29a658382204885385c1e25026423350905000000000000007c706e6c00000000d9ca3db79a3398ebc028340982a4462f860f6ba22fbf9bf321716d31dcf1cfe12133a1ea75c5de523d79c8fff75e027825c2387b2a6869ff7747db8731e7dd6a0cc678cab92df33bae652b82344e7ae4e961704447b7d8c138f50c44af2874e645582d2e1a06"], 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r3, r4, &(0x7f00000000c0)=0x209, 0x5a) 10:54:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8100001000008913, &(0x7f0000000280)="92a55ccbf784e1cd04684ffcfed17586778021c7955989ccac821db9c6d0c752ff057c4df7f4f1061d0032e1c9202a29a0feca8613f22493eed5b77368148c054f2265a104e81d2eafadf767f27862c50e114d3f6392cd89a4fe08a6f2366835d106948890aa1517210c8bc90a7f20b228a2244076562b748f81b32d85b1248186eb2a0cc96cb5024b620db3f0dc6bf1373a2bced9b435f56c814ccefecafc6c4c5f73b22b3187c81718b3fcc4e4ded49433eb18f2b98cff0f29816a4ae0130fa50b3ec5f91a86815d3f152fee94f01af7a82520748ede07ac28c9daded5d7656f09f7ff5035889a426828caa21f841bc17d55976f6536dbc85acf4db1ab08d40ad7e2a17d6963b988e160bb6df7047632c491887385ba57") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000580007041dfffd946fa2830020200a00090003fe001d85680c1ba3a20400ff7e280000001100ffffba16a0aa140009b3ebea8653b1cc7e63975c0a15a300"/76, 0x4c}], 0x1}, 0x0) 10:54:50 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:50 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000680)='/dev/adsp#\x00', 0x3, 0x402) flock(r0, 0x2) r1 = socket$kcm(0x11, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x29, 0xffffffffffffffe0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x1, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffb5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000740)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000780)={r4, r5, 0x6}) rt_sigreturn() recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/144, 0x90}, {&(0x7f0000000300)=""/124, 0x7c}], 0x2, &(0x7f0000000480)=""/187, 0xbb}, 0x100) sendmsg(r1, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="9cffffffffffba007a9b80008100", 0xe}], 0x1}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000540)=@assoc_value={0x0}, &(0x7f0000000580)=0x8) getpeername$packet(r6, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14) openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/autofs\x00', 0x41, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1d, &(0x7f0000000940)={@mcast2, r8}, 0x14) write$FUSE_LK(r6, &(0x7f0000000640)={0x28, 0x0, 0x4, {{0x7aa, 0xffffffffffffffe0, 0x1, r2}}}, 0x28) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f00000005c0)={r7, 0x3, 0x30, 0x9, 0x7fffffff}, &(0x7f0000000600)=0x18) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x200080, 0x0) 10:54:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x20000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) [ 1990.604327][ T3393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') recvfrom$inet6(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x10001, &(0x7f00000001c0)={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x4) r2 = socket$inet_sctp(0x2, 0x801, 0x84) delete_module(&(0x7f0000000080)='md5sumwlan0\x00', 0x800) sendmsg(r2, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) recvfrom$inet6(r1, 0x0, 0xfffffffffffffcf9, 0x0, &(0x7f0000001240)={0xa, 0xfffffffffffffffc, 0x0, @mcast1}, 0x1c) 10:54:50 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1990.745618][ T3407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1990.764330][ T3413] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 10:54:50 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80001, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x1ff, 0x4, 0x0, 0x2, 0x9}) ioctl$FICLONE(r0, 0x40049409, r0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r1, r1}, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) accept4(r0, &(0x7f00000000c0)=@xdp, &(0x7f0000000140)=0x80, 0x80800) 10:54:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getdents64(r2, &(0x7f0000000040)=""/44, 0x2000006c) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 10:54:50 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:54:50 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x66f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:50 executing program 0: r0 = socket(0x11, 0x802, 0xfffffffffffffffd) write(r0, &(0x7f0000000100)="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", 0xfc) 10:54:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe}, 0x14) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x10001, 0x4001) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {0x77359400}, 0x3, 0x101}) 10:54:50 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x670}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:50 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:54:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2c010000, @ipv4={[], [], @dev}}, 0x1c) 10:54:50 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='hsr0\x00', 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x39c, &(0x7f00000000c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 1991.546618][ T3413] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 10:54:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@v1={0x2, "edb23683c3244bb5a6"}, 0xa, 0x2) clock_gettime(0x1000000000003, &(0x7f00000004c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)={{r1, r2/1000+10000}, {0x77359400}}, 0x100) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x20, 0x1200000, "a710a369249eb9ecb012e950124fc7a9782ffe6a794c2d54", {0x9, 0x4}, 0x8}) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000280)={{0xf002, 0x100004, 0x0, 0x3, 0xfffffffffffffff9, 0x0, 0x7, 0x787f, 0x0, 0x0, 0x20, 0xee}, {0x2000, 0xf001, 0xa, 0x5, 0x6, 0x2, 0xffff, 0x8001, 0x8, 0x1, 0x2, 0x8}, {0x100001, 0xf001, 0xb, 0x80000001, 0x7fffffff, 0x1f, 0x2, 0x6, 0x80000000, 0x5, 0x1000, 0x8001}, {0x3000, 0x1, 0xf, 0x55ad30, 0x10000, 0x6, 0x6, 0x1, 0x1, 0x80000000, 0x3, 0x7}, {0x3000, 0x1000, 0x8, 0x0, 0xfffffffffffffffc, 0x6, 0x8, 0x4, 0x2, 0x9, 0x4, 0x6}, {0x4001, 0x4000, 0x1f, 0x6, 0x7fff, 0x2, 0x2, 0x8001, 0x10001, 0x3f, 0x3, 0x4}, {0x7000, 0xd000, 0x3, 0x4, 0xffff, 0xe7d, 0x6, 0xd7d8, 0x10001, 0x8001, 0x800, 0x80000001}, {0x0, 0x4000, 0x7, 0xff, 0x400, 0x21b6, 0xfffffffffffffffe, 0x5, 0x81, 0x77ab, 0x10001, 0x8}, {0x5001, 0x1}, {0x4000, 0x2}, 0x358fc9fb0fc0d71c, 0x0, 0x2, 0x500040, 0x3, 0x400, 0x15000, [0x5, 0x7, 0x3, 0x80000000]}) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x1) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 10:54:51 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x671}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:51 executing program 5: setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:54:51 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xffff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x9}, 0x8) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) 10:54:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x20000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000400)=""/167) renameat(r1, &(0x7f0000000280)='./file0\x00', r1, &(0x7f00000004c0)='./file0\x00') syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local={0x1, 0x80, 0xc2, 0x3f00}, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "d8652b", 0x14, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x10, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x0, 0x3c}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) r2 = gettid() geteuid() lstat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000540)={@ll={0x11, 0xf6, r3, 0x1, 0x8, 0x6, @random="3d29225da7a0"}, {&(0x7f0000000200)=""/52, 0x34}, &(0x7f0000000500), 0x68}, 0xa0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r2}, 0xc) 10:54:51 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x3f000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:51 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x3f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) 10:54:52 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x674}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:52 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) [ 1992.692277][ C1] net_ratelimit: 25 callbacks suppressed [ 1992.692285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.693172][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.698073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.704415][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.709651][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.726943][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.732819][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.738822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.773071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.779653][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:54:52 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x675}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:52 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x3) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x50, r0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000000)={0x2a, 0x29, 0x1, {0x8001, [{{0x0, 0x3, 0x1}, 0x0, 0x9, 0x7, './file0'}]}}, 0x2a) ioctl(r0, 0x4144, 0x0) 10:54:52 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x54000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) utime(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x24000) openat(r2, &(0x7f0000000140)='./file0\x00', 0x42, 0x40) 10:54:52 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x676}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:52 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x8000000000084) shutdown(r0, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/125, &(0x7f00000000c0)=0x7d) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 1993.372848][ T3549] IPVS: length: 125 != 24 [ 1993.424027][ T3558] IPVS: length: 125 != 24 10:54:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x7, 0x26) semctl$GETNCNT(r0, 0x5, 0xe, &(0x7f0000000080)=""/66) syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="cd390b081bf2", @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x33, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 10:54:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff3d) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000000)={{0x3a, @dev, 0x0, 0x0, 'sed\x00'}, {@multicast1, 0x0, 0x0, 0x80000000}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101000, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f00000000c0)) 10:54:53 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x677}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:53 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x103800) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$int_out(r1, 0x545d, &(0x7f0000000180)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) 10:54:53 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x678}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x4) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@ipv4={[], [], @empty}, @mcast1, @ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 10:54:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xac141400, @ipv4={[], [], @dev}}, 0x1c) 10:54:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:53 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0xa000000000000005) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x20440, 0x0) r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)=0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xfffffc65) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00)={0x0}, &(0x7f0000002c40)=0xc) r8 = getpgrp(0x0) getresuid(&(0x7f0000004140)=0x0, &(0x7f0000004180), &(0x7f00000041c0)) lstat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x105002, 0x0) sendmsg$netlink(r1, &(0x7f0000007800)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000007780)=[{&(0x7f0000000680)={0x324, 0x42, 0x402, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0xe, @uid=r2}, @nested={0xe0, 0x28, [@generic="510e4f859112e12b52a26c564d090683ac057ae22fb7bae639ab180ace51a79613e6a8f1a693ac076184fb8136e1fa32aeafb4c64a54b20e4933644346f55436e2d6eef35622802111b3630404da7d822af198a7a60c11ce3d89968396a0c53ff744e4b8b1e9b0221b8e5e42d1576494cff9235d6e58e6ad3e7a4fc85e3c6b4563a9cc6fa07668c91b991c9063a047ebff592f2e0262f251b88bbb88c719c51a42699efe893521f7a201bd732625a82edd", @typed={0x4, 0xbd}, @typed={0x8, 0x6b, @ipv4=@multicast1}, @typed={0x8, 0x90, @uid=r3}, @typed={0x14, 0x8c, @ipv6=@dev={0xfe, 0x80, [], 0x16}}]}, @generic="5a76d6a1155f4c04b6d8d1b30ed95b9469d2b0b49eb22917ced70b41d8a12f2c1725d0ef24d5df218cd9cd7d452780c97ab29aa87865cb66d92edb08e64e205a97282f37226f0d9816cf26d52177d7de664bc3edf807e18f283c42c7c414cd0025bc56a9d39d8ec9fbb1983af43c6211ea085b64e2abc44c8742c95068fd6a10740bcefebe48b981f63ff65b9e081814214b4c179d64f85eacb40709d32d4f3587109cf53575637f1673915baff117d52caeeade2af450abda6636c544aa6e079c6e16b4be3749117d07437e299e", @nested={0x14, 0x14, [@generic="a0b891291574cca2958601691b10eb"]}, @generic="76ab35e53b60be9a361f43891b23398b303726551dab917f8c9b8f0d5571d6b9564b4538e1034f11922b56a41e8615dad98b5634f626e5ba135e3ad076acdebd55caadc370a3fd3ac3ee608fedda7bad3b6b0edd9e77291c2487744dd52a9defe4b543be344812205fa66654b8e802a32a80d2a110f6ff8a8d94a31f717f7efb06ab3ec724fa7b34a1b0a4a23fcda144c496e68a9145ddde73fc3b08", @nested={0x10, 0x11, [@typed={0xc, 0x22, @u64=0x2000000000000000}]}, @typed={0x8, 0x78, @u32=0x4}, @typed={0x4, 0x73}, @generic="881fa5fec4a51e2a57ac82ec3675f02a7cacbb4a76e4f49167099dd9a4b86f8bcfd9f735d86cf802f2701ce59d3ce668afc96b08199921823c3e7768a90b6108ed779732480049056a2c67e030842c36a0bfd02de5875dcb8d6c733f2506570347a4263b8ca60c53ddd690df3d71b1140599f40bbc4212f6de90d6cda4059cc73a59c806981712c3fc87c18f945a17"]}, 0x324}, {&(0x7f00000004c0)=ANY=[@ANYBLOB="a400000018001b042bbd7000fddbdf258c008b006a4325e8e1025acdf31a85be76318e02f61044b7a2d844ef62c475a2dc7310728401ab956b7eba54c555fd90758b72c09eb75801c13ec449769488cc64120f5f930c20c2e2e5224915c667d024c5b00d5c34217fa771ff3abfffffffffffffff004e2cccb850eaf5beaaacf2ecf1a515ed0ca68955eaf0421c68ea7b8dfe3fab994880b8dad3b24ae7c53dfc", @ANYRES32=r4], 0xa4}, {&(0x7f0000000ac0)={0x211c, 0x13, 0x305, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x1034, 0x68, [@typed={0x8, 0x5d, @uid=r5}, @typed={0x18, 0x36, @str='s\\curity.capability\xf6'}, @typed={0x10, 0x1, @str='vmnet0user\x00'}, @generic="257e327593351692d5d00376c0f0ecd0e8349d8b210a6bfb64138ad5cc54cf062c1335cc2bf0ad6f8c52a92be69aa75984a56052fbbf36a357687f7d63179c6948e2613eb27e048b9fbde99060103ac1e204c57554b09b02c2c36c08e5c55034b1456ed74c6a83f348ae3d7da50865de083d4603571eff233417376e0ea53ae25d038b3bc0e9ac559096d5f69714eb70ce66a6aac0693fa729a06bbbf3de1d7d6388d159c6a27316b702638ff4d1f38518372203693df8a0a08d566d23247f7ef4ba0a998327fdc99e393601eb89429348b6008276cf9f189fc2ede4f270c76a0db1af958ce6526ac1bbca5b14de9ad9768c563ddef348a599f98e8ff6b49ac5ec694a4f7dba83a3f45542ae029fa2d8c22a1727804f782989b461da4464f68998238d6592ba217dbf609b4c6560aee7e74191e8be88851534f89c05b7cc6d3bee9b7c98ca1522c7e7ee747bafea5860895e3bc6de9876183a4bd0160c8dfc349b80c540f3769802512c82e23974c74645f6fd10af915ae6b8bd5019f1b67ae9dfb3d3b1821173c47831a8adfa81ee91b50712ebcecc096e3876b81f0c5e7bbc949317b307f58abf4f9b9fa67ae3b184783f9833c815cf159ff1cf1ce0dfc7b22fc4aa0eb50e52e5ad4617ac5714679be7df369797c3d39611d6b3b7b9c65cf4de2f7c3e7ed9992a52f62bda453944c71cc2798d648573fd21cfc265daa9cc554fbeab1e518a026ef168440e56041d84f68eb799e04e57ca69d95c2eb3af7fa910d899cd2d776dfed7f63d28964d68bac1967e2bb7b376721cb394496212a09a7e54f29fa90656f13750af2b9925b590e016ddaa7462b69a340411d7acd6977edebcd4cefcf42a4ce83ec19006f95ee468380ce64b5e72fd16db024f37097af45a7ac229005d00e63862e937b4980fff8f3f05cf71b8b4ca2df7af0cc496ea37741746c469d358a92c22071830461f5ec05a096c63a2f84c83bba4846bcb1863c9e716e59d4b0917c3dc6f742446bdd0ef76c8012db53187fde4b4255191f6c49e721af6814418642de7cd4acba5362b5a84da3ca7be81c3cabdb21eb862b7a84fed1c3f2fd79b2a00855eb637ce2ee58d71c2145b492aa2fb48d66733d683113f00273ac0dd17f6039fda48b8f543c75f115a0f9ccc900cc1c5da30985eb8766c702c0a110a1e382ee70fa927fdec1627d592d192f1abf0ebc6dfa5df33eba1fa2b655b65f706aaf076b214764eaf5aa9f6e4551e741eb3004a1806f4fc83f608f59e9ea06ddc315eb12767afe6f06235eb6380b2867234ded467a00321d3fe9b0bd8d0e494809bb9a1735ef61df77496afdd255ce0eb93f4fc3814a62c7abade869bfde2fca54979059edef833125d59c7f8c676f831c1d514f6602a9f2f9c83c2284b13a079a9b8a691aea64023acccb15de8c38bb251dae506d9a94761cbbe7237e132327dd05f69632d016ae630e7e821e455ffed3b1ccfa13f96ff805eaa387f7823ae2fd7e812f42d7b9a716af17598bffe937428ccb757940e14e921f7dc4fd9e835f6e203ec9f1f6adc25d538e5fd909084083f07f14de952f4533bd5d2f3e35b945f9d582fd535aafdb8e230b1c446a9bcc16f844ca566c4f6f7bf3242c311cc8b73f6a93e73af545db7448d8621555217e0f9e4f3fb8a7a50806eb7288a0c860977aa848e0000c6b8b2b41479b54c339b2eb4a0cb791f358e9bd5306a7dda1a872cd4d1b68c3f0d0511e2f3ea6ce65c55f9bc257c54d5e873276cd81bf0f82376df6a23be4caaf93a9ebfdc89929903c86ba7a168b25645917897c31275c7bc1c34de73e1fe371fc9a62226c8de9b842a7f008c03eecff819cdb017fecdbe305e17b0178b44c68553cf70d4733aac2d54362cbc9d3846bf725f10dd0b6b1a0317f7a11099012339453f44a6d119f69869f8c1a0b50b5782218475c354252d682caf08c566a884b781d9e1ac98e74f2d85365be52f96080b2d0ff7e358ec8423c0b3c50f5f955d5c08be57d08d5160dd5d9735bb836e0b0d0dd423b4b9913260704f0ee0f39c22886666a84449f91dfe32f962716333df34b25aacdf7ad41a4439461f2b53dff06de4e944cb14bf9b4f383a2d1feabd803b91fb1ad891890d543886586e4de304bbd8d65d583b9ca27f96aabe3e8b5f4fcbcd3839cab45a762d8463254914c6a9733c050e47a137d2a7a7af29daacf5a4639a8485a8c1c5c1972a74f8062ae2e7020a77267710c443b7621fecc50dec6f65b5ef5233fdbe4d4da6feefd34d4cdf87e21e2bc13af42fa5b668d1861673ab6b9b10feb6ddb24b29163a572b04e30dc169526c5de4397a2c5567cbd866a53e8338df84192c100afe5c5d1f6eda5c12a37d98006d7c18ea1897e97f7c67f4a372462ab5331f673a95d4409a225aa3d8e832e20c09b24a21b768b057ff2dddef16dca23c7a372c55b15ecf52914699ddddec948b5ea3c07dd705a8ca6cd1baa4e665a31b868f268c27c22ee46b929a11def3d589a0f9e7db2534326b4b69d85e543c478d86e34823abf6412f4c3f8c26087e814db280018d125c3904f0c233fb380e123679c57b515ad47b81e067eb03a9757c777015a8211691e699745bffca5b2a7750426808e8b996cd43ab11b7e5aa0374ccdcc596c215b94ea05785a49170ff7ae13e3702b04bd995dcb3844e927411bd36c795793776a817c65b1ad3db278f1a696a2ba36ad843067f571d2c2b9152a8b4f754d93d5f348919bda6211b85028e760bd9961b011038f9197e8a2ee8b18bd0864d16ffa48e96e0502db226fa6da7a6612edfb34e667175bda7b29570f0bd4fd4628659dae8b9b581284ea50bece478e34a28e43e8acbb82a012e16aca4bc74a9d8ef04eabef8e968da9da71eb2168a43322c474b7543125fe78c60c5bbe48bd67f004655a459b2927f1fc0d9622a60c7879b45c6587c6458d0b2a1e02153dd4b3961cb8a94029a6b9de82794a58f5508f923fc5a9de955e7585fbba33188cf8cdf0b887e64540bce0b6183b2e23d3e80373cc44679de97b41e2f17ce760ec282760aaa57fa036f88a829b12df89766f78c571061eaa11df03d01d6e69eb692792f6f5acdf730cb8d438c92e081a5dbb1b6a127e45e235c670986a8fea32d50b000083bd26ae2bf108d29f5c9f9b042ae39983f16dee6c1e5333b748f4cd9058a9ba80c08b53149dc63e635cd5074d77ce56d85b638082890de3bf123a4ec51f4fb35417b280a471f1ea5a05dd659f094111285d82a591a430cb385da01bf1f3c8d54e3affbcc43403cd7a33c67f85fc303d5b1a424f7eaf82c5dfcad6eed88048805724b6f22e83512749906843dd96c71c5888eb8796e2d06aec61a692e304fefd448318c0935bebfb6b3f7ebbe0eb2d402b67ec093a04b5a326901342ff0bf82c44e21807ece59e81a6726e1ad8787fec7657fd37be3d674abd326aa70077ba0ae6ea248831578f0085d005deff9fa821729f09a3bdcdd45293696544d82a04878b7e032fe7be20c9bf6a779856b88b3b05315674695445e1f9e06873077d727700fe82da542dbb80f6203a9b643312d0580500f358866098e778875046c2b5522ccba4052c5ceb1f9c0f3b21af82a8a173751b42224c6a94c8e52e8a7e03dab11b6136e0baa47f632adf282a7204e1b40a24921718aebf2d14793fab7ccc14a5daf9a5eda781347d268e892e6d1d32d6c43fd16284cea6429213dc3f8e6b25c75b04786a1e149caadcc7931f372627b3720bd749f681d4b207c6fdc77948eb21b575bd872261f6a1a0bcc2c95f7775ac78ba69ee4d69e0b89fa887abff8c0e8c952f9816ee780be9b3f79b5ff78019f9c080c8c9d6b6ed7acab8e882d7bd8050b968d44a609e83ec9dc19d393ceb9dd0dbf31bec9b39911246a6db63b08e1935d084e18d7cf3e6e104d979ded28042f38d2f9894a9680dd8ff601ba3b3073a088d27881dbc2ccf39b6ef92e51b522cd7c062add9cb9cf5459f8642103cbf833c5e9a2337333b1ef9f1587032a551ad6eb2795fa30f0de826ac1facc8832bbf62849587b6a4dedd1289e9708d133b12ecf13e8a3866a564e39f50dd4e4dacd096ee86c085e476a8f0586f897b38df8c4e14edba1a0e5edfc5088ce385130ffb65ee71c8ab7dfa4f4ee5de4673b3a976364c07b52c36b537d66c87abab49a807ccd12fbc8871ae812a4907ec5542c6a8670570a73ef9bed2e85b6a9a8e54e68d6e7cd9515c15b2a258ba4964c97df4fdabc895621e4f1631ba7ca1149c452507e2b2f3fb08c229bb3784a4b1a3dc307a9f8dddccafcae43e94137f707a568c8b29dda1a7d9fc386883a8f54f0b336b38aca786db35eb808f62931c347b0f2fd9b845c3828597ec66a4b0172e98c8b7ea986db51e8c9b892d18ea69cb87a027d8be5d3543a3d0ba9eee56e6bb010b95fc17778598e03d1577c48b1149c74fc88d4fb89533a68551b500f2da827cd0f65e440bf9c8f2c24f1b71e576e9f78f138097bf5bde74be8db1faa430a7559a04b4059a8088d14a2d1753b82579b34fd85f413ff1f56cbd6b325e64e5a608b88c7edc0cb282415717e1134e25377ac0688df36b8ddab5438669bfbfee89d1a48caa0f6a542347ddea64ba1fb800de125926b311761c947045b7e2674f7a6403bad180ad1cd24862b2e25ae01c50a13feabd0fbf25e4ab17c6dde29bbedf680a60864bba966b7e80e9b3334c818816b8b3bbe2057bd13bd46f7d1d3420557156acf0b5ab61b02dbf290ead4b9b7aef26e1fdcb2d4f328b70726a31e25448ae07f31b55ddf5c9fd0bde838e4e628a6e1835ae894f0fa3451d0c4f2eb42df655197c905da2567f0f437aa7449734eabf2c6422acee2f310c2dd1491cca55a98f592c8243010efedd82a6b46e1a50f92a71596748ab22372db0273fa14d38a28cee62c5508fba2a6c02125ec1bf3233e3b589135d52dd3876c800183972c7a0705a4cb692e12597e914135b623c9373acd1aff29871230f91321d295a88562bc487988f72bad6a25349b82c147a02eac40c1b87a2a069a543e6f3ed3b52cc619367d841c2805654ee69fabf295d363d345e97cef3250be2713133327d7ca15b061bb65f7477779a20420619f9ce48bc9aa66e9fa3a9a66a82477a6083520d4f571f91818b98e9fefd7fbf167da152ce9f2a831cf90785cfc62574623c838d7dbdd940e246101a358ed59c7ee24af8990574f324e62134ec06fbaa2f676bb5ddb37716fc90520cbbcc855aea237695dd59b721daef7844b2df9811850b54c55204c07d70dede4402744327fbcab296fff2557ba27df5c360bfbdb72341ac31af04da03dd2f572bcffab5d371fdb06ccf2f83ead465eebf9a5666d61dff92e3f90da195a59d18fa0459ce5970e17ff2197b9cd6e9bf64a0335fbe7c0680fa101ba3407ae7846532ab0c5bd8072b508a4731fbf5dbbd406b1ba864c3ba6f17d707e1b1089739574853c05ba5ed52257d8f7d5f426970fa940c1a75f9f8813938bcc05577ef3cc07beedd3539c5409fa2be7f31dca130a17d9516c44da1a22c70cac90fa0ded79f62f450afd8a7aebe1ba426718522e7c1e14619ee42b9b312a069ffb275a8c057d152ab3ffa577b02e69504a574d229df94883c3eef8cdc77bf33e54cc287b8d54231ceae2bafd37def336a3a7f06bfee71891f708256afe8b8ec196ef5d954d464c2b43a650bba8696f0db790ca0cb5e8827fddc0ee04c5369fc185c062de574ed9d1cfd2b3428409c0e7a6708de50bf4027b4710e0ace1a228ef7de6"]}, @nested={0x4, 0x73, [@generic]}, @typed={0x14, 0x3a, @ipv6=@ipv4={[], [], @loopback}}, @typed={0x14, 0x66, @ipv6=@rand_addr="2d8442fcbc035f7029b73e981b391085"}, @generic="5ed84f065b851421705eeb514479ce745c2921e6294140cb8ebdd2a9fa665bfd5c11265180d01362647739f3197066bff017376fee869a52950cea3f3d381e42583e24624401911bfecc109aa6f6c119820084c77fbcf3b005e42195266b253aa15908da978423db49626f07b03de9207eb456d2e3f464e6e6869cb8f3e9508673300582360ebad0cbb1cb516ca23f06ebbff74919881be611", @typed={0x8, 0x84, @uid=r6}, @generic="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", @typed={0x8, 0x8d, @ipv4=@local}]}, 0x211c}, {&(0x7f0000002c80)={0x1498, 0x2e, 0x4, 0x70bd2c, 0x25dfdbfe, "", [@generic="a0129500d852f52db877322379bc40a04be1198b2e1bc0b27d1412e0c30205b238cbfa053538b985a0926d3e095ff40b4700f34d2eaa9c6561fa6520756bd385d703a7f83c53a6762ef7ef1faf853d5044404e5f6acb60d9cef3527c159a0d0415c68ee928bea3f0894e964ce8358890b1de5c3502247ac2ba7ccbf8a6da2a81498160bbdffd7962c4389aa37ecd", @typed={0x8, 0x80, @str='\x00'}, @generic="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", @nested={0x198, 0x72, [@generic="8eec631c13effb06e6104e314ad6ece14145d162db38960c2c4f36aecd2a91bc6844a1a7a102f23c75a933205a527c98333b6307eb677487f1b753915e9aee4675724babd168446ab3046bc7e18e5e8aa67372cc7141cd863dc5565815e8db55129e9a9e537de4b58a45b8f2ef5eec6908f1d5d6bcd402876fa7c39c7b81c723e4c8e5a90f6241228987303a11099225973bf57c7ac77206413e54012cb78701306c43e19c9fa0c17339518283406f9389a43bc4c06696b55c7507", @typed={0xd8, 0x8f, @binary="a79809e9edd5058e260fb05a55bf5c1c576e8d8bb26e5af3ff3fb3d34d4e0e2db67ed19cfa9825410d5a1df80d1d0793808b0f3c7215517293faa058785efcad194bee88e80f8334707087de82816d242ea128d0ec2b8c9b635b7236919d2189b8da1feb59a780e37859264d0eca1bd1e81424a2d92de4c3cbd78d6a1f5b78a580a0d66831b656262d3b5b6be23d68d56ed9f174ac674bacd8af753ebf7e9b921dea3e773990aa743f38262f4e4220144bca90509528946acd130f34bec45c6449802dac03df5b418bf865aadde30a59d8dc6d"}]}, @nested={0x1d0, 0x20, [@generic="570dbf982b336267468fab2b2ea4a3106a103f66a7de67c535120ffe92818339ad3744fedf7c76c522c4aa3698", @typed={0x8, 0x2d, @ipv4=@loopback}, @generic="70d7aa647bd8139673268b6f7ef6d61ad3eb65f83eac7c8ad472271adb118e09b0ec9c81d1ef9498d8d558641967631febd89acefc346f180755a64e1a1e9b70fe24b3ea9553750766555f1630c8d6ba205b7d68c43e4f73a9bd40bb339d00a4461e6a6d4258ea7c2564aa2c1dced28695536f5f685a1762e19284b4ec45428a494f4a67e9237923a023c7618ea9907d3b8aadd5cbabebc9ccb86909f5f9ee16e6da28218bb8c9476c25e3cc2e5bd0cdd5ff77a845b614", @typed={0x8, 0x3b, @u32=0x1}, @typed={0x8, 0x18, @pid=r7}, @generic="a87381460002e4e32810e42fe8c95d009e5311e7599b0bcfe30019f12bfd4ab2c6c503", @generic="cbd40d77ba1609209a60ad2c896b572f33eb9e1d6bbc1768989fde1370ae6319fb708b05b9b2e5cd0c57b397ad65b5cacd715233362e649bdb9402906383135c64d1120846cfdc0722f0437b54a845aa20587a7247b2aae494f108cd7024c8156ef4a9cb76f2f5ce4545b8d9e174ab5ac23f2c8875d5d8768b62d6c07e9062cc26eeccce5c16746251697b933820b5b31128d1ccd40d521a4c710ff3ed290cecf0721c4af65564c5e8b8"]}, @generic="d972483c33e8f33c5da0de6c0fff11b0f126a75b3f1fd221eb37b48e43107ef1708109e7a3ac0b581d05e7b7146a638b43b0bb10853dfcd97f8557c3275c381df685382813316b30f87ab359ad96c6e77bb46caa408da85d7d3aab2af6b6a52144ec371076b1f08114efe58d7c6cdec4b1e5646ba451c9c49814252730cb1275d7f5f2c5279e2fa8c91d"]}, 0x1498}, {&(0x7f0000004200)={0x3460, 0x15, 0x400, 0x70bd2a, 0x25dfdbff, "", [@nested={0x28, 0x70, [@typed={0x14, 0xe, @ipv6=@loopback}, @typed={0x8, 0x38, @pid=r8}, @typed={0x8, 0x43, @fd=r0}]}, @nested={0x2264, 0x21, [@generic="4da5c1bcc902cb2f7bb7f7b896b2d390b4d8c412671f4a15b870ab873fbcc4e42d476ddae18946c80d83297345ae8a7eb866a6a12b4c27d9c542173b1ddf8278bcfbcb9f882d384e194712f7fcc334facb58310a952fd141a60b7e76f80c1cc1eb46bd5b08a7c44851102c3152320c0c6c135134bc23fa3fe7d93d79c421b749896c21e8d35f7135158af39200faf0d12301de65f98790d98fa389bc03b5d04c2ce2e8e23e31311dc449d0a44c5875da", @typed={0x1004, 0x4d, @binary="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"}, @generic="18e9cb8cbc6c36f7919053c3be9891e93def675f60343db7e0eccd1446207e74574f843c317fc314d720df1bcaad40dfe495887caf31bede46f68db79cf1bcc4dcc479fb93c6cfd54ca956b3d41cc7166d9a7f171872b9ee462a1a46fca64235b81a4f6c507158bfeadd5dc1d48536c3fb7056630f6b956d46ea2252b4582892123b1bf100bd611e0337ec6611402bdd415c8f372173fab149ffdbbbf63a2dc40f96d94a5a44eb36c7be4107686385f9a4af1169f207313179f864a938f5eebc09da91aaab25195a", @generic="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", @generic="41507d59f138024edeafe6a6b5e28f184e03109956a622a9e17b88eb661312ac9815b013dfe113913ea2816cf3e22000c63fa0b99ab9eb47aaf73644c223ce49784128fd18ea13459195c296eb6d7979f0ccb8dc6e4ba0e201f40e273e99318fa352283be2bcc38fcef3a332223c0106a09fce3b427fa3afeeb3d9016bc52607676d3c3eb60dd29cb50c8f1cfc927afdbb88f5bcc6c87d19068de9fb82d296efe1c4886ef8699ee2f02429478a8953e9ec29e4c20d397628c4cea8ca043572a32bf59d0e224bb41483c314f265263d0b", @typed={0x14, 0x49, @ipv6=@loopback}]}, @nested={0xe4, 0x58, [@generic="9f3dc8cbc7f10ae415e5216ae38c473ee0be8776184cb519936803e4c148f7d67345c30f3a40273a763e1e32bcf7c22978323db1c38b821784d7ffe8fa595b63936acf681c9375ce", @generic="135e4bc452cd088fbc551c7e165bb47ed3bba45401a9279b726bfd02635d04114f82c367089ee58d362b34e8ef328e56d9e4ed904d6320f34c296f51de4ea8553edde7e42243299f7851ec914673d0965c7fb2d87cb64d275258eda81358d95a368808a98fd4eeaa5fcb80ef1e1d24e9f9b84ebd0d93a747270ce8550e77f09656f2fdf47c3c303d54f53629bc602be4", @typed={0x8, 0x15, @u32=0xfffffffffffffffd}]}, @typed={0x8, 0x59, @uid=r9}, @nested={0x10d8, 0x49, [@typed={0x8, 0x8f, @fd=r0}, @generic="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", @generic="a499a12811629887f50b80708e29c397167a8a75", @generic="1b1fbcc0107ab35be49ff314e25a366414e36f8b6931928f1a1a7a3c3185bf36945f7aef1a13d29f81a10792c681dfdc0277e09bcc254720a1ceeb3a80d33c9f2a8e0b75514c325cd2d68f47161cf6aa87bf76fe218f874c0f690e97f677530268330dc2a5865203a6a8762acfe72c8c7785d3357574d490b3d20f3cca2991d3f8d62dc25108c452b0d4da0225e863ed051d21fa244832de1faf488856039d5d1321401f9ef1033dab", @typed={0xc, 0x73, @u64=0xb94}]}]}, 0x3460}, {&(0x7f0000007740)={0x40, 0x14, 0x300, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x30, 0x34, [@typed={0x14, 0x81, @ipv6=@dev={0xfe, 0x80, [], 0x29}}, @typed={0x8, 0x2f, @u32}, @typed={0x8, 0x12, @uid=r10}, @typed={0x8, 0x4d, @fd=r0}]}]}, 0x40}], 0x6, 0x0, 0x0, 0x800}, 0x4000000) r11 = getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="3e535528a5d18a500100"/20]) setpriority(0x0, r11, 0x10000) sched_setscheduler(r11, 0x7, &(0x7f0000000080)=0xffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x80000001, 0x242, 0x9, 0x6, 0x0, 0x40, 0x2c00c, 0x5, 0x8001, 0x6, 0x4, 0x5a16f0d8, 0x3, 0x298f, 0x7f, 0x1f, 0x5, 0x0, 0x66cd5438, 0x8, 0x8, 0x4, 0x20d, 0xe39e, 0xffffffff, 0x7, 0x200, 0x8000, 0x800, 0x8, 0x1, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x5, 0x3}, 0x4012, 0x3, 0x3, 0x8, 0x101, 0x200, 0x40}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) open(&(0x7f0000007880)='./file0\x00', 0x8000, 0x54) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = socket$pppoe(0x18, 0x1, 0x0) r13 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r13, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r12, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r12, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x1, 0x8000) 10:54:53 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000000080008, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xcb, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1}, 0xc) 10:54:53 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x679}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:53 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:54 executing program 0: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) clone(0x2060800, 0x0, 0xfffffffffffffffe, &(0x7f00000007c0), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000440)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="2f6465762f6e62648393d9626d6d56dd000000000000aed3945ffd4f2000b3a1e317be9e70fd86f50a228ce5885183b346ea669e18fff357e6cd4e55568acebdc8e89ed1d6833d2254b2360f293353e9100828dd60a6a83dc456a91c576c2403e63bc1aeaec88b9e8a7b106229bcc63b8baf2f48bd02bf64495ae10c95a2fb1da1223d8bf7d6326919df65d81af6bde414056b4c98afada6840a0f6df0e71fb79c7104796931f331993aaaac3f85bb591cec3b6e804d81a9e4940f2579f907960c95a2"], 0x0, &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000740)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000100)}}, 0x18) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xce, &(0x7f0000000080)=""/5, &(0x7f0000000280)=0x5) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000240)) sendmmsg$unix(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000600)="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", 0xfd}], 0x1, 0x0, 0x0, 0x1}], 0x1, 0xc000) r1 = add_key(&(0x7f0000000300)='.dead\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000480)={0x0, 0x7f}, &(0x7f00000004c0)=0x8) 10:54:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x25) r1 = socket(0x10, 0x3, 0x1) sendmsg$nl_route(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001e000106000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0xd], 0x28}}, 0x0) 10:54:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:54 executing program 1: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x6c, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1a77}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x36e}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0xfffffffffffffff8, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000080)={0xf0003}) 10:54:54 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:54 executing program 4: clone(0x2000000c00ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x40000000002, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1994.944707][ T3636] ptrace attach of "/root/syz-executor.4"[3633] was attempted by "/root/syz-executor.4"[3636] 10:54:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xe8030000, @ipv4={[], [], @dev}}, 0x1c) 10:54:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:54 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:54 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0x8, @loopback, 0x4e22, 0x1, 'lblcr\x00', 0x21, 0x1, 0xb}, 0x2c) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x2) r1 = getpgrp(0xffffffffffffffff) r2 = getpid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x101000, 0x0) ioctl$TIOCSBRK(r3, 0x5427) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) kcmp(r2, r1, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfff, 0x40) ioctl$VT_RELDISP(r4, 0x5605) 10:54:54 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:55 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) 10:54:55 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:55 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x67f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x8, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x8000, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x40000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000340)) semop(r1, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x52, 0x141880) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) semop(r1, &(0x7f0000000240)=[{0x0, 0x7fff, 0x1000}], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f00000002c0)={0x10000, 0x0, 0x1, {}, 0xff, 0xffffffffffff0000}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000200)={0x7, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}]}) 10:54:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xf4010000, @ipv4={[], [], @dev}}, 0x1c) 10:54:55 executing program 0: getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000000)=0xffffffdd) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x2, 0x6, 0x7, 0x3}, 0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000180)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0xd8, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x2, 0x0, 0x1, 0x0, 0xd00b6ecd786482fe, 0x0, 0x0, 0x18, 0x38, &(0x7f00000000c0)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x3}], &(0x7f0000000100)=[0x0, 0x48, 0x0, 0x40, 0x40, 0x20, 0x48]}, 0x6}}, @request_death={0x400c630e, 0x2, 0x1}, @release, @decrefs, @free_buffer={0x40086303, r1}, @increfs_done={0x40106308, r2}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x60, 0x10, &(0x7f0000000240)=[@ptr={0x70742a85, 0x0, &(0x7f00000001c0), 0x1, 0x2, 0x1}, @flat={0x776a2a85, 0x1, r3, 0x2}, @fda={0x66646185, 0x9, 0x1, 0x7}], &(0x7f00000002c0)=[0x78, 0x40]}, 0x5c}}], 0xb5, 0x0, &(0x7f0000000400)="73fa7f3e7d5160ea77cfb4d3a11b0dac969c73e3cf2dddb868cad2e2f9e701bd44328e59d160220f2a5d016d36b30b972ab1cefdb2aaeca1431ae23ab65945752ea4507f571f4edd0be546f6754488f45cbf4b70aadaff73fe8b3cfaf274c85404879eae586bcae043142dcb6e4d0a34a374ccb39d3a5af58cea19491982f3e36d6bca3a90e7a40416da422fe76317d343e8bbbd054a7092380f80f5d309a2f758e9242f1b75f6a8d48c53ec6f7b9ee8cae497d976"}) madvise(&(0x7f000033d000/0x4000)=nil, 0x4000, 0xa) 10:54:55 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x680}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:55 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000000080003, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4200, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x02\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="05d38c2fb5fb6a1cfc8ae21c18538b445d6653eee5ca3e8d8f4adefae6f2bea5"], 0x20) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xffffffb1, &(0x7f0000000140)=[{&(0x7f0000000200)=""/156, 0x33f0f}], 0x1}}], 0x2, 0x0, 0x0) 10:54:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:55 executing program 1: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000800)='/dev/amidi#\x00', 0x2, 0x101800) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="2d0000000600000000000000000000000400000000000000017079818fe7cfd46f006800000000000021e719d0"], 0x2d) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @empty, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x210002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x648, 0x188, 0x0, 0x188, 0x2c0, 0x188, 0x578, 0x578, 0x578, 0x578, 0x578, 0x5, &(0x7f00000000c0), {[{{@ipv6={@mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffff00, 0xff], 'erspan0\x00', 'veth1_to_team\x00', {}, {0xff}, 0xbf, 0x6, 0x0, 0x40}, 0x0, 0x140, 0x188, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x80000000, 0x57, 0x3, 0x0, 0x2}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x0, 0x2, 0x1, [0x92, 0x600, 0x0, 0x6, 0xff, 0xffffffff, 0x2, 0x3, 0x1, 0xe84c, 0x7, 0xfce5, 0x4, 0x6, 0xd1ea, 0x1], 0xf}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port=0x4e20, @gre_key=0x9}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, [], 0x28}, [0x0, 0xffffffff, 0xffffffff], [0xffffff00, 0xff000000, 0xff000000, 0xffffffff], 'hsr0\x00', 'vxcan1\x00', {0xff}, {0xff}, 0x33, 0x0, 0x4, 0x20}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xc, 0x100000000, 0x3f, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x2, @ipv4=@local, @ipv6=@local, @gre_key=0x9, @port=0x4e21}}}, {{@ipv6={@ipv4={[], [], @loopback}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, [0xffffff00, 0xffffffff, 0x0, 0xff], [0xffffffff, 0xff000000, 0xffffff00, 0xff], 'bpq0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x3c, 0x200, 0x4, 0x14}, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x8, @ipv6=@empty, @ipv4=@broadcast, @gre_key=0x1f, @port=0x4e22}}}, {{@uncond, 0x0, 0x180, 0x1a8, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x8, 0xfffffffffffffffa, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x76, 0x0, 0x2000000000000, 0xd12, 0x7, @empty, @remote, @empty, [0xffffff00, 0xffffffff, 0xffffff00, 0xff], [0xffffffff, 0xff, 0xff, 0xffffffff], [0xffffff00, 0xffffff00, 0xff0000ff], 0x20, 0x100}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a8) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000880)={0x0, 0x4, 0x100, 0xd}) 10:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x98, 0x20000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5cb5, 0x0, 0x2, 0x4, 0xc9, 0x6}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x4000000000000003, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0x9, {{0xa, 0x4e22, 0x10001, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7bb3}}}, 0x88) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0xc0, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000100)) mincore(&(0x7f000063e000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/124) 10:54:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x4) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, &(0x7f0000000240)) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, 0x0, 0xfffffffffffffe28) ioctl(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) 10:54:55 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x681}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:55 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x7, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) getpgid(r1) read(r0, 0x0, 0x309) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) 10:54:56 executing program 0: r0 = getpid() r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x101004, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xf5, 0x3, 0x9, 0x0, 0x48e5384b, 0x80000, 0xb, 0x81, 0x5, 0x7aaf7c3, 0x2, 0x9, 0x1, 0x4784, 0x3, 0x0, 0x10001, 0x6, 0x1, 0x9, 0x10001, 0x9, 0x3c2, 0x100000000, 0x1f, 0x17a, 0x7ff, 0x9, 0x2, 0x0, 0x2, 0x10000, 0x5, 0x52, 0x7, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x40, 0x7fff, 0x0, 0xc214f18ad61203b8, 0x6, 0x5, 0x3}, r0, 0xc, r1, 0x1) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) setpriority(0x2, 0x0, 0x800000000000e6) 10:54:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:56 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x682}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfc000000, @ipv4={[], [], @dev}}, 0x1c) 10:54:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000080)=""/18, 0x12) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x480000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x6, @time={r1, r2+30000000}, 0x4397, {0x4, 0x4}, 0x2, 0x2, 0x8}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x800) 10:54:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x88000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000004c0)={0x800, 0x6, 0x200, 0x3f, 0x80, 0x3, 0x1f, 0xdd, 0x0}, &(0x7f0000000500)=0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000540)={r2, @in={{0x2, 0x4e20, @rand_addr=0x8}}}, 0x84) ioctl(r0, 0x3, &(0x7f0000000400)="04001f8b2bec760c32fe292607e0123c123f319bd070d70031a9e13efb43ae79ef656c1c70fe778614604e3641aafa6dd91206c87b1475") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x21f) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x2000, 0x0) getpeername$netlink(r4, &(0x7f0000000180), &(0x7f00000001c0)=0xc) bind$inet6(r3, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r3, 0x1) r5 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f00000003c0)={@ipv4={[], [], @multicast1}}, &(0x7f0000000440)=0x14) setsockopt$sock_int(r5, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) timer_create(0x7, &(0x7f0000000200)={0x0, 0x2a, 0x4}, &(0x7f0000000240)=0x0) timer_getoverrun(r6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0xfff, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000300)={r7, 0x6ea9}, &(0x7f0000000340)=0x8) sendto$inet6(r5, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0xfe2f) 10:54:56 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xd88cb1791a321e63, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x28, 0x2}, 0x28) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x40) 10:54:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = accept(0xffffffffffffff9c, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0x489) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x0, 0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000d80)=[{0x0}, {0x0}, {&(0x7f0000000c80)=""/31, 0x1f}], 0x3, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000032) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x20200, 0x0) r3 = syz_open_dev$midi(0x0, 0x0, 0x80000) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) r4 = syz_open_pts(r2, 0x2) dup3(r4, r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) dup(r3) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x809f4b47e6eb0530) sendmsg$xdp(r6, &(0x7f0000002440)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000040)="f9c458418104c8e50b83390d3f3c0a675df0aa27", 0x14}, {&(0x7f0000000100)="ffee5ba61f1e95383b8202b72df9675ffaa1fe8e0854970c866612f9c405fb6a86835b6eed2003e51701ada9eb5c60f81b2707d3a1ddce7ec018d52fc6fbc6f64641f3e6910ac146c067193391b756e0cd11ff99f298a19b8a40e7f7fdb60b1429a89dfea49262d8e3fd97b5c350b77b51273f1988aa429ea66b07c9e49a11633cbe2138628a42eae9fa449653ca20ee3a2cc1b42c1955496e5f", 0x9a}, {&(0x7f00000012c0)="a3f7f4a28a206b7d921d08fd3a8b7526bf94e1c2beb7dc37839fcc1fd3a22e723a44ee7698f0cfd090380858914cc03f2c89e8d8c7cdf13f7b93dabe28468297515cddb61a88ec913205a1df2f279cfef7cf71b2499c069e168b3faf70403198796d799cb9108934f96b9be40ce04c0db00f4933ce222188801e9a746b0818fc29552a018ae81fd1a601adb0f2423d3771e5b5dc42976f53", 0x98}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000280)="6cfe3c6930f813c196882c46ae6e40105860f737c71a4043a6b9868c7ea97b8c6af68f2dc3894f59cb20a3939dce06371d1d", 0x32}], 0x5, 0x0, 0x0, 0x4000011}, 0x4000800) r7 = accept$alg(r5, 0x0, 0x0) sendmsg$alg(r7, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r7, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r7, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f00000001c0)=""/35, 0x23}, {&(0x7f0000002680)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 10:54:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8200) ioctl(r1, 0x1400008912, &(0x7f0000000180)="0a127e123c123f319bdd70b50000000000000003e8f98617f19c8509694f18e1112b21338b5194f9dfe00d2f603a740a6c1b2492078bbdb0937092cacffb5e3939162b53000000000000000000") ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000000c0)={{0x80000000, 0x3ff}, 'port0\x00', 0x8, 0x80408, 0x2, 0x6eb, 0x200, 0x8, 0x6, 0x0, 0x2, 0x7ff}) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0x40045731, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, [0xfffffffe]}) 10:54:56 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x683}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x800006}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@ipmr_getroute={0x1c, 0x16, 0x525, 0x0, 0x0, {0xa000002, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x2, 0x5, 0x2}) [ 1997.358102][ T3782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 10:54:56 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x684}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000300)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-ce\x00'}, 0x58) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 10:54:57 executing program 0: r0 = socket$packet(0x11, 0x200000000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0xfffffffffffffff9, 0x9, 0xffffffffffffffff, 0xffffffff}, 0x10) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x13, 0x0}}], 0x80000000000015a, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x1000, 0x8, 0x1, 0xd1eb}, 0x10) [ 1997.530373][ T3786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 10:54:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfcff0000, @ipv4={[], [], @dev}}, 0x1c) 10:54:57 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0x8000000000000001, 0x0, 0x0, {0x300}}) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)={0x0, @reserved}) 10:54:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c023f319bd070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x200000) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000100)=0xfffffffffffffffe) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000001c0)) r2 = socket$inet(0x10, 0x2, 0x0) accept$unix(r1, 0x0, &(0x7f0000000400)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000002c0)={{0x6, 0x5, 0x76, 0x100000001, 'syz1\x00'}, 0x1, 0x20000000, 0x3, r3, 0x2, 0x6, 'syz0\x00', &(0x7f0000000280)=['/dev/vcsa#\x00', '$vboxnet1vboxnet0+\x00'], 0x1e, [], [0xfff, 0x80000000]}) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000520007021dfffd946f610500020000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 10:54:57 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x685}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x5, 0x3, 0x7, 0xe3f}}) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3a) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="ac516b2af2a7aedf7e263ab23be0093b2d22b141f77188f4c8fcd0fa257432c30fcc2e5573ac739a92fab69309f7c776f447efb5138209563e599aa8022a08573b5529d6f76581561c996e328b606b50c33aa39f0da5380a82f5652749498b9d1642fb9201b0c320c912ea0c3846c5ab85b94edf0f503ccca2cfb94e014224cf0a8ccb228b65959be702ec27b3e9bb5e828b5c11ca3498975a12cf0ce731ac67b7e28d672a83f7fcec60ea7d2e62c1d423ae662fca", 0xb5, 0x4, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000003c0)=0x7ffffffe) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x201, 0x0) write$UHID_CREATE(r0, &(0x7f0000000400)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000100)=""/89, 0x59, 0xffffffffffff0001, 0xfff, 0x3, 0x3, 0x7}, 0x120) r1 = semget(0x2, 0x0, 0x200) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000001c0)=""/121) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'bpq0\x00', {0x2, 0x4e23, @multicast2}}) unshare(0x40000000) 10:54:57 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x160, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0xa0, 0xa0, 0xd0, [@cgroup0={'cgroup\x00', 0x8}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1d8) 10:54:57 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{0x0, 0x24}], 0x1, 0x0, 0x172}, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) readv(r0, &(0x7f00000000c0), 0x2d) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, 'keyring'}}, 0x28) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="109d0f937e"], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000100)={0x10000, 0x1}) 10:54:57 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x686}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 1998.287164][ T3810] IPVS: ftp: loaded support on port[0] = 21 10:54:57 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x687}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x100000000000000, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:57 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x40045567, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x7}) ioctl$NBD_DISCONNECT(r0, 0xab08) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x10000000}, 0x4) [ 1998.818926][ T3810] IPVS: ftp: loaded support on port[0] = 21 [ 1998.932305][ C1] net_ratelimit: 28 callbacks suppressed [ 1998.932314][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1998.932385][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1998.938068][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.943937][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.949664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1998.966917][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.972780][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:54:58 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfdffffff, @ipv4={[], [], @dev}}, 0x1c) 10:54:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@remote, @in6=@remote, 0x4e22, 0x0, 0x0, 0x2, 0x0, 0x20, 0x80}, {0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x2}, {0x9, 0xe0f}, 0x9, 0x6e6bb2, 0x0, 0x0, 0x1}, {{@in=@dev, 0x4d3, 0x2b}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x27}, 0x0, 0x0, 0x3, 0x1f, 0x2f, 0x8000, 0x5}}, 0xe8) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020700090200ff5a0000083b34000001"], 0x10}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 10:54:58 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x688}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:58 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='ramfs\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x100000000, 0x181000) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000200)={r3, r0}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) syz_open_dev$midi(0x0, 0x0, 0x0) ioprio_set$uid(0x1000000003, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r4, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) 10:54:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:58 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) listen(r0, 0x7) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x81041}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x810) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) [ 1998.978529][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1999.012289][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1999.018189][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:54:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x1ff, 0x7, 0x6}) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1a8, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffc0}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8c9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3b}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfa7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2123286e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x70b0}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x7, &(0x7f0000000000), 0x4) 10:54:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000340)=0x101) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x440000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000140)='eth1\x00', 0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet(0x2, 0x3, 0x19) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_group_source_req(r4, 0x0, 0x30, &(0x7f0000000200)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @initdev}}}, 0x108) socket$inet(0x2, 0xf, 0x200) getsockopt$inet6_tcp_int(r1, 0x6, 0x3b, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 10:54:58 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x689}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:58 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x8100) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000180)) r1 = shmget(0x3, 0x1000, 0x604, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000080)=""/63) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0xb12, 0x8001, 0x6f, 0x5000, 0x10, 0x57, 0x3, 0xfff, 0x64e, 0x4}) 10:54:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfe800000, @ipv4={[], [], @dev}}, 0x1c) 10:54:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92%\x00\x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0eI7F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xcc\x00\x00\x00\x00s\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x04\x00\x00\x00n\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf1\x00\xf5\xf7CT|\xcf\x88\x9c\xe7\xa7\xad\x13Y\xc7\xe7\xc8\xed\xae\xea\x1b\xb4P\x98q\xcc\xeb\xbdw\x9c\xac\xfe`\xe8\xfa\xf6\xdcm\xe5\xc4\xcc\xfa6\xc5\x91\xee\xeaT\x8b\xb8&\x88\xc9w\xab\x9a\xb6\xf3b\x8e\xc4$\x98\x06\xa5\xbb\xa8u\x96\xea@\x83\xc0\xa7\xe2J\x86\xa5\x1a\xcb\xa8\x0e=d\x9d\x10iWO&+Ivu\x8a\xff\xe7s\xf5 \xd7\x0e\x1b\xd0\x13\xa1m\xf8\xf7|\xc7\xd7\xa7\xb3CGI\x00\x1e\xf9>\xecR}\xf8\x82\xdbg\x97\x98\xf7\xe2l\x1d\xc7\xa0uv\xc8\x9c\xd5\x90\x01\xe3-\xfdn\xe8\xcd\xbc\v\xd2\xfd\xf2aj\x9dS\x1e\xc21\tz;\x82_3\x1e\v\x04_\xdf\xa3Y\xbe\xb6\x8d\t\xa5\xe7\x1c~\v\xbe\x80\xd6\x1f/h.\x8d\xd2\x17^\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x121040, 0x0) accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) read(r1, 0x0, 0x0) close(r1) 10:54:59 executing program 4: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/144, 0x90}, {&(0x7f00000003c0)=""/118, 0x76}, {&(0x7f0000000440)=""/215, 0xd7}, {&(0x7f0000000540)=""/197, 0xc5}], 0x6, &(0x7f00000006c0)=""/137, 0x89}}, {{&(0x7f0000000280)=@in6, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/110, 0x6e}, {&(0x7f0000000880)=""/35, 0x23}, {&(0x7f00000008c0)=""/201, 0xc9}], 0x3}, 0x2cac}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000a00)=""/10, 0xa}, {&(0x7f0000000a40)=""/16, 0x10}, {&(0x7f0000000a80)=""/229, 0xe5}, {&(0x7f0000000b80)=""/9, 0x9}, {&(0x7f0000000bc0)=""/168, 0xa8}, {&(0x7f0000000c80)=""/233, 0xe9}], 0x6, &(0x7f0000000e00)=""/132, 0x84}, 0x1}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000ec0)=""/190, 0xbe}, {&(0x7f0000000f80)=""/226, 0xe2}, {&(0x7f0000001080)=""/201, 0xc9}], 0x3}, 0x3}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000011c0)=""/8, 0x8}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/120, 0x78}, {&(0x7f0000001300)=""/20, 0x14}, {&(0x7f0000001340)=""/177, 0xb1}], 0x10000000000000c8, &(0x7f0000001480)=""/85, 0x55}, 0x3}], 0x5, 0x0, &(0x7f0000001640)={0x77359400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r2 = socket(0x20000000000000a, 0x3, 0x0) getsockopt$sock_buf(r2, 0x1, 0x31, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@broadcast, @in=@remote}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0x29, 0x7, 0x0) 10:54:59 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x10000000000, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x80000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x4, 0x70, 0x0, 0xfffffffffffffffe, 0x7, 0x0, 0x0, 0x5, 0x1840, 0x0, 0x0, 0x5, 0x1, 0x8b, 0x1, 0x2, 0x80, 0xffff, 0x84, 0x3, 0x9, 0x101, 0x4, 0x87, 0x9, 0x400, 0x8000000000, 0x0, 0x7ff, 0x7fff, 0x3557, 0x8, 0x2, 0x2, 0x3, 0x1, 0x7, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x80000000, 0x5}, 0x40, 0x3, 0xd553, 0x1, 0x8000, 0x7, 0x5}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x20a, 0x7a000000) 10:54:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:54:59 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:59 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000680)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000007c0)={'hwsim0\x00', 0x0}) sendto$packet(r0, &(0x7f00000006c0)="bebe132264bad299c34d37165bf278be306ad1bbf5b66c979bacd5156ef9ec5ea3cb34fa3b56ac038b", 0x29, 0x0, &(0x7f0000000800)={0x11, 0xf5, r1, 0x1, 0x8001, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="b400faffffffffffffff0000000000009500000000000000a7ae4b9ad554dd119d239e2f69df33ade2af3611728617224e11c3e49c0bf3ad0237a11a09f98f2512669d51"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000400)=""/195, 0x0, 0x0, [0x42]}, 0x48) 10:54:59 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r1, &(0x7f0000000080), 0x1a6) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x100000, 0x2000}) 10:54:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0x413) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e25}, 0x1c) listen(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 10:54:59 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:54:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfec00000, @ipv4={[], [], @dev}}, 0x1c) 10:55:00 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x12) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2000, 0x0) sendmsg$key(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x5, 0x9a90, 0xb, 0x2, 0x0, 0x0, 0x25dfdbfc}, 0x10}}, 0x20000000) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r6, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x8840) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000100)=0x6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r7, 0x6, 0x22, 0x0, &(0x7f0000000080)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x4000001000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x1000, @dev={0xfe, 0x80, [], 0x2b}, 0x5}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, @in6={0xa, 0x4e21, 0x6, @loopback, 0x3}, @in6={0xa, 0x4e21, 0xde, @local}, @in6={0xa, 0x4e24, 0x2, @local, 0xffffffffffffff01}], 0x9c) r9 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x12}, 0x4e20, 0x0, 0x4e23, 0x7, 0xa, 0x20, 0x20, 0x7f, r10, r11}, {0x3ad20455, 0x3, 0x1ff, 0xb9, 0x0, 0x5, 0x7715df01, 0x7f91}, {0x1000, 0x9, 0x2}, 0xfffffffffffff4fc, 0x6e6bb9, 0x5e114ee99e600188, 0x1, 0x1}, {{@in6=@loopback, 0x4d2, 0x3b}, 0xa, @in=@multicast1, 0x0, 0x7, 0x3, 0x414, 0x8000, 0x40, 0x400}}, 0xe8) ioctl$sock_inet6_tcp_SIOCINQ(r9, 0x40046109, &(0x7f0000000300)) close(r9) write$P9_RREMOVE(r9, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 10:55:00 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:00 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r1, &(0x7f0000000080), 0x1a6) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000180)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)={0x100000, 0x2000}) 10:55:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = gettid() r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x22001, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000000)={0x1, 0x401}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) prctl$PR_GET_THP_DISABLE(0x2a) r3 = dup2(r2, r1) write$apparmor_current(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="70e036f7696174203078303030303030303030303030303030325e2f70726f63007468ac6561642d73656c662f617474722f63757272656e74002f70726f632f7468726561642d73756c662f617474722f6375727265ce31dc4089906e070005f3116b740028776c616e30a14ff5e1550e8059"], 0x1) tgkill(r0, r0, 0xf) 10:55:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:00 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x68f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3ce93489ca47e9a5"}}, 0x48}}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000080)) sendmsg$can_bcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002f00)={&(0x7f0000002e80)={0x5, 0x0, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "58a5bd49977432a5"}}, 0x38}}, 0x0) 10:55:00 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x690}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2001.238603][ T3981] Unknown ioctl 35123 10:55:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:00 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x691}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c070a35a5cb3eab676dcbeabd204e4afa3962547faebd8453ed03d9672cabc09c1897fe2cb5765cc27928d2e7987f74991b983bcc995b7f5b88001e06fe59f79fbde4df989bfb82b8a904dbacee40a400c8be01c0d4c1b961926f47d6bbd1f976246dd9e3c42ddb6499064aa31086f6b9b3051d12b68762ce4015d31104ad856d97484fe313a1ce83a11e5c451b64f0562633125866d2bdc14bf0ad1ffc2ea884c0530c058a1e4b946a1f7c439c99214e026ab33ebd9dc795cb4ca2fd16c8fca") mmap(&(0x7f000047c000/0x4000)=nil, 0x4000, 0x7, 0x40000000000031, r0, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x2000003, 0x32, r0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@acquire={0x40406300}], 0x0, 0x0, 0x0}) [ 2001.649253][ T4008] binder: 4003:4008 transaction failed 29189/-22, size 0-0 line 2995 [ 2001.678574][T11419] binder: undelivered TRANSACTION_ERROR: 29189 10:55:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfeffffff, @ipv4={[], [], @dev}}, 0x1c) 10:55:01 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x692}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="11"], 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="00c2b8cb4f98992f9359f997c1f2a22db8459bbe6a721700f69f2d6a8894"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x397) ioctl$KVM_NMI(r4, 0xae9a) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000080)=@v1={0x2, "b8190816"}, 0x5, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x3, 0xa6, "860bea43b2ba1ab3768c9edf269ab765139325e155cc5e47ab354754c9391066befdcfc7f4dca2796d9cbbba2b358c49272ab711f808dd594e5bff1769daf3e9b098006dfa2fa29b0b9260fe61e780966254f4f89e8621d612581789b8dd119c1fac65bd4265748be2156aa6fbf3c77f421a19125a96901c064c04061a74687db43465fca98d85168e00f26c7c55984f64b2ecda66b0be1c48b10b69880e2d01998ffec7904f"}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x8000, 0x0) ioctl$int_in(r0, 0x2800810c0045005, &(0x7f0000000000)=0x8004015) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000280)={0x7d, 0x0, [0x5, 0x3, 0x100, 0x8]}) 10:55:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:01 executing program 1: semtimedop(0x0, &(0x7f0000000000)=[{}, {0x0, 0xfffffffffffffffe}], 0x2, 0x0) r0 = semget$private(0x0, 0x0, 0x82) semctl$GETZCNT(r0, 0x3, 0xe, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000040)) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) r3 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x7, 0x80802) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000002c0)={[0x4, 0x1, 0x3000], 0x800, 0x31, 0x8}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x100000001, 0x101}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0xf2}, &(0x7f0000000200)=0x8) 10:55:01 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x693}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:01 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000180)={0x55, 0x5, 0x4000000000000, {0x1, 0x7}, {0x7f, 0x100000001}, @cond=[{0xf82d, 0x2, 0x5, 0x0, 0xfff, 0x5}, {0x8d66, 0x1000, 0xf87b, 0x61, 0x1}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000240)) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x804e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e1f, 0x79, @dev, 0x1}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x2, 0x0, "9052ceabb571ebc67123139af57c9988c00a8e01e97e85646a66d947388e7233", 0x6, 0x0, 0x10000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000266, 0x0) 10:55:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x3, &(0x7f0000000040), 0xfb01cbdd028b9044) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x142, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000040)) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="83c1e1e91c424f9440526ab49108227b1bf913ebb94fcd78e39ff4a7e43608fe9dbbacb9de10791254d66fa3a4e2454de080f26b8cf480c6167785b8c1e0e0be5cec677720148770d05873881b01a3dfc682824f3aebd47956abcd2857444f0446dc87205bde96fc25f79adc84d2ae686ad6b4104c3c4f5b43b36a56cb0918e2e4eda31b953173aa5ae53e4ea50573481fa2d1be6bddebe881ee7591c5f21fb94987b22e8532985c5ea5cd8e78ef86aaac70099cdee3f87516a508098c07709ac3935e898cc355cb8e08c6e727ae1ef21b0004eefe2ee1bb0546f97379", 0xdd, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r2, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x3}, r3) 10:55:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f0000000000)={0x14}, 0x14) write$binfmt_elf64(r2, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) lsetxattr$security_evm(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000002c0)=@v2={0x3, 0x2, 0x13, 0x8001, 0xf8, "62848ea521209908094efd31c78bd1b665215c39f4218653c71a78a0b1af42212bf412ce5ce0864e796de58fe6faf6b9e7cd269cdf1acd46f1c1a3ed351006eba2b7ef394d95f476fda8fe658904fa85422ad4737915d80463331a726ceb3dc30cbc0008aa3517644cbf5628b8632ee4a96d50a0e5b7be32a49eb1c8e31160d3db9a3108bbdc694bf9b64d9fc0bf203133886b8568292b2e2fb6223261c6ed46a80ca17654f661bae4704f341e9d75005c1fddeebe7edcdf499f5425e4ecdd9c0682009b2a8a9e6e19f2932cb4a0ad6ed477ec2cb286c29470b49cbcd62b28d595af9ed79c03f5b35cdbff6a473dcae8c42fbd6f80725b6f"}, 0x102, 0x1) recvmmsg(r0, &(0x7f0000001000), 0x3fffffffffffefe, 0x2, 0x0) 10:55:02 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x694}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xff000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000500)="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"}, {&(0x7f00000004c0)="e93ec8b016bfbf30d73bfaa01fb709b9c547e42ba2676be9cf", 0xfd95}, {&(0x7f0000000380)="4d0aa2435bb38f6c0ff3081868b3fedfbf668729b18193311292f7d1e893ed9602ff74a2287d2b836511403d6b24fb10e89c14872f7dd9de1849f601e07ad6e9644b9fc6fd92caad679025af42f1f10d882d0ee5e04f73d266a47533033dc71288926716d7e430fc28ff2b103a14767af14cd7a3afc8a211a40551eccd5d38cc99ef4c1a79a84e1bbb7be41e432e81df4af7b3600d38f872cb2d170ca7f8e11eb5045a50fa0ae413b8e5ed163adae49c3e8038cb956bfd65c77ac8e37cf26a63b53eb19ca186b53b3a3d891b52b2cedcdf7d21ed0c917311f1b39507"}], 0x1000000000000149) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="ed64ef4b4d7c167041127f5f66155cce77d6c2fd14a647462fb791754e57a1799421592ca296e2acd036e5373d2c04656b2a43c7b48bb9fdab04a155be7059eb34b103abec350771ace043af5c9730feca7b1e86966531bfa8ce8c3295a7cda2ffb1564dd91f84db901a23ce60fddc867a4af7b3f65ae6c75cef1e1678266a92c34aaf", 0x83) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x14000, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000040)={0x1300000000000000, 0xf000, 0x1, 0x4, 0x12}) gettid() 10:55:02 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x695}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x410, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x11d}, 0x1c}}, 0x0) 10:55:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$kcm(r1, &(0x7f00000006c0)={&(0x7f0000000140)=@xdp={0x2c, 0x4, r2, 0x33}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)="de2699025f9d4e3289f0bff4ff78cfd298b4116c5e5ac47b05b584ab0555c8cf8adc65324ded378d17ce05dcbba6cd2d7ee09dffb0c78f2da54a644d8a5dd28365f31b1c5b17001f130f0a4efc575795b293d080b500b09e479e3ec906f2a5c0829882a9eef3499274ba7ae71862b35c022494bd169dd62b641df3ae71d13c45bc5d7d62af58a57d6e6bca3798a4b430c72afa16eb1fd05a3ad3752fae5140004a9c9bb94f330b05b398cb6fb28292f444ef7d93b8e851ab3349f9aef14e7fbd43f7bb1a56396667e958", 0xca}, {&(0x7f0000000300)="2ca196b6e0660ae8588357ab33a3744e443aa73880ad941223489c18bcbd6714311e8bc449015875f9f63f10602f1cdb58fa639715c7737337bb9d2ba24adcbd0cb4422ac83f64ad67bcaa84d5dec4920d30b2723e54cf7a319a4e12a22cf9bcebedd260833fe9c1f30f572720d754daec6e59fe3446bf5be9bbb1b3f8117fc62b0e81c6871f0f2e2974e0a6618878338c3d", 0x92}], 0x2, &(0x7f0000000400)=[{0x10, 0x112, 0x6}, {0x50, 0x1, 0x3, "992841de86eab723e57eebb7578767be918917eb03688027c8e43d27827f6a3963b702db94d3b7898ec05d185facd468668b0588186d7813e076"}, {0x10, 0x1ff, 0x7ff}, {0x90, 0x103, 0x10000, "d76279b0d124b045ab89a0c8bccc8d5dc9a43c0cbec64a3e0bb73d85e7d61601348b7d42c974282684d5862f95ad4dd23b87d6b0fa41e6bf39321e7944a2ab7d01a4d1e3b8972f268c6daa77114bd4be93dffe26db2853f10c138c6e211ce82e05f3c25daa5a0501bd18142686545b2bbd46ef1ef30b72b0445da4"}, {0xe8, 0x0, 0x1, "12e5f49edc7f5e40d94b6d4bc8fa410ef615f5eda75f897fac7d5cfed1665588f0025ed6069ed8d9f86bcde680ef38955434c4b1932ca18828d0b659ac8cc773c9b3ab6997f487178521b6bc3568b60b849b68a31b9d9cc55163d715ea9f21b4e0e6560fab302c8969172a4c2657367e058637b7eae3c7672a33ea63a3e8e5a9e471ae4577a83339a3d569b499cb10eb810d696ca228eb4f206249fcc893dcd4b073f7116906cd29a5b83150d5aaba2b93097472c3208ed663a1b2006b07f788328d352aaeb6c5d661964ddfc7fb53c23237"}, {0xc8, 0x117, 0x4, "be162e4e91527dbe0ad2721d75c7a5739362a86810a2e4013e816bad264acff174e77aae0350119637f945b519c45115f684273d7a2b0d488cb4a4f2d27894e899ed13d6ff1aaa5720b6e6c437e76828e0d4b02ae89621b5d1145a6d530a93b9e088ade9f48041072535d216627b3727dd7984e0a260380da99eddb4e20141d269b447e77c37931c2e2a3badcaeec6447d77731754401e38e37b26ced2db49e295dab656a2732d3dfe25251d608f6c11714e5a"}], 0x2b0}, 0x80) r3 = socket$inet(0x2, 0x3, 0x6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, 0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_buf(r3, 0x0, 0x20, &(0x7f00000001c0)="1414d59e6826b40f27000000", 0xc) 10:55:03 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000070a07051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x3}], 0x1}, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10001, 0x4, 0x6fa, 0xffffffffffffff7f, 0x7, 0x3f}) 10:55:03 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x696}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:03 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)=0x5) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) 10:55:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0xfce6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000000), 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0xe00, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1f}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000000}, 0x44) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) close(r0) 10:55:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mknod(&(0x7f0000000100)='./file0\x00', 0x8000, 0x442) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x7}}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000080)="fd2abefa00000000b2276e9b64334255e653cf972d000000") setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0x94, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x1) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000007f80)=@alg, 0x80, 0x0}}], 0x400000000000040, 0x10122, 0x0) 10:55:03 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x697}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfffffffd, @ipv4={[], [], @dev}}, 0x1c) 10:55:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000081, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) syz_open_procfs(0x0, &(0x7f0000000940)='numa_maps\x00') mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) 10:55:03 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x698}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:04 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x439) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000380)={0x1, 0x8, [{r1, 0x0, 0x2000, 0x4000}, {r1, 0x0, 0x1000000, 0x8000}, {r1, 0x0, 0x100000000}, {r1, 0x0, 0x4000, 0xfffffffffffff000}, {r1, 0x0, 0xfffff000, 0x1004000}, {r1, 0x0, 0x1000000, 0x1000000}, {r1, 0x0, 0x0, 0x1000000010000}, {r1, 0x0, 0xfffffffff000c000, 0xfffff000}]}) clock_gettime(0x7, &(0x7f0000000280)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000200)={0x20, 0x4, 0x0, {r2, r3+10000000}, 0x400}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaabfba1f917ce387dd601bfc97004d000000ff020000000000000000137599ab605d6152db229c9000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd3682368620af3f223124015531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afabcf4006560328a8ea866a875dd3995ec57664747d420b9d104343c063e2a61383783d2e55000000"], 0x0) 10:55:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000140), 0x1000000000000375, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 10:55:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x02\xc9\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX$\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000640)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) syz_emit_ethernet(0x4, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x0, @ANYRESHEX, @ANYRES16=r0], 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400000, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x2a0, 0x0, 0xe0, 0xe0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc0, 0xe0, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x40}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x6, 0x9, 0xab5, 'snmp\x00', 'syz0\x00', 0x452}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 10:55:04 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69a}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2005.172277][ C1] net_ratelimit: 26 callbacks suppressed [ 2005.172285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2005.172292][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2005.172345][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2005.178190][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2005.201290][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2005.207165][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2005.213091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2005.218891][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2005.252300][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2005.258240][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:55:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfffffffe, @ipv4={[], [], @dev}}, 0x1c) 10:55:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:04 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69b}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:04 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x3e, 0x0) write$nbd(r0, &(0x7f0000000080)={0x6000000, 0x0, 0x0, 0x0, 0x7, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f63af872a0a11e32f7a0eb6bb02f6b78b1ea580f6ba185947306a84c6c5e7be78ab9406a3ea21ad8514d024cacb80e3ba56"}, 0x68) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) [ 2005.478802][ T4158] dlm: no locking on control device 10:55:05 executing program 4: r0 = socket(0xc, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0xae1bf85a372a8e14) [ 2005.537385][ T4158] dlm: no locking on control device 10:55:05 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$void(r0, 0xc0045878) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) pread64(r0, &(0x7f0000000100)=""/175, 0xaf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:55:05 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69c}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x1) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0], 0xffa7) write(r2, &(0x7f0000000100), 0x1ede5) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8200, 0x0) sendto$rxrpc(r3, &(0x7f0000000100)="491b575454c61ceb8e7a661dfca7fbb2c6", 0x11, 0x4000004, 0x0, 0x0) r4 = accept(r1, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x800, 0x0) close(r4) 10:55:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8040, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'veth1_to_bridge\x00', 0x4401}) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f305010008000100040423dcffdf00", 0x1f) dup3(0xffffffffffffffff, r2, 0x0) dup(r2) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) unshare(0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) close(r3) 10:55:05 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000002c0)=""/161) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) 10:55:05 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69d}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2005.969100][ T4191] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2006.169255][ T4200] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x8000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="05000000000000000000031c00000e000100100001007564700a73797a3000000000"], 0x28}}, 0x0) 10:55:05 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69e}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x400000000ef) read(r0, &(0x7f0000000000)=""/187, 0xbb) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000100)=0x336, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=@fragment, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xd0101, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="28090000a69bf46c4964e985bdf42faebb4015cca64db83daaab2bc9c6707d52026cd35d39d8557709f0d4c13905822516d8cef1cf42ac59cbb7c8bb3eb993887ae1d015beadf2d7c043c7eb8af8", @ANYRES16=r2, @ANYBLOB="040027bd7000fbdbdf250e0000001400090008000200050000000800010000040000"], 0x28}, 0x1, 0x0, 0x0, 0x8004}, 0x4004) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x1) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:55:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) [ 2006.394175][ T4207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2006.432815][ T4207] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:55:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0x2, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="8ee95abda8f5", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2006.515182][ T4222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 10:55:06 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x69f}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:06 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0xf000000, 0x0, 0x0, [], 0x0}) 10:55:06 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:06 executing program 4: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000c80)='[trust\x03\x00\x00\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x480000, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000080)=0x6) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x20000102000007) [ 2006.829887][ T4222] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:55:06 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x3) 10:55:06 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x100000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:06 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:06 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x1000000005c832, 0xffffffffffffffff, 0x0) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x2, &(0x7f0000c00000/0x400000)=nil) 10:55:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) socket$inet(0x2, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x8003, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) 10:55:06 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r3, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe94}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa364}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffff57c}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000001}]}]}]}, 0xd0}}, 0x10) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x70, &(0x7f0000000080), &(0x7f00000000c0)=0x2bd) 10:55:06 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/dsp\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x12, r0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000080)='keyringlo))\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0xffffffffffffffff, 0x3, 0x80, 0x2, 0x0, 0x2, 0x0, 0x4, 0x95, 0x8, 0x4, 0x30, 0xa8b1, 0x6, 0x1f, 0x4, 0xff, 0x101, 0x100000001, 0x5, 0x1f, 0x80, 0x8, 0x0, 0xfffffffffffffff7, 0xe451, 0x9, 0x100000000, 0x5, 0x1c610000000000, 0x5, 0x7fffffff, 0x4, 0x9, 0x80000001, 0x1d27a2e1, 0x0, 0x4a, 0x2, @perf_config_ext={0x0, 0x600}, 0x100, 0x1, 0x5, 0x7, 0x7, 0x4da, 0xffffffffffffff7f}, r1, 0x10, r0, 0xa) 10:55:06 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000400)='/dev/adsp#\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs$namespace(r0, &(0x7f0000000480)='ns/ipc\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0xfff, 0x430000) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000380)={0x100, 0x5d908f73, 0x0, 0x3, 0xc, 0x3ff, 0x0, 0x9, 0xcd7b, 0x4}) io_uring_register$IORING_UNREGISTER_FILES(r5, 0x3, 0x0, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r5, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, r6, 0x701, 0x70bd2c, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x4, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r5, 0xc004aea7, &(0x7f00000003c0)=0xff) r7 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fcntl$setlease(r7, 0x400, 0x3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000600)={0x2000}) ioctl$KVM_XEN_HVM_CONFIG(r7, 0x4038ae7a, &(0x7f0000000300)={0x5, 0x370, &(0x7f00000000c0)="e32bfbec683b3a2c8b371454e5f5091e2ca9bcf90ba66c623fc3ee49fdc7ecc91074ae4696d0ce0bfe1a0e4f6ea79709bda821d314c4035243f403d2a12e92d6be13ff20ab69cb102dc82c0a524d6cbce5d3d529ebb03a7ed05604fa326f82d9c26d2d7bc5c9eead78db236364c6d6641c7dc053bf6695034f32aed39165f2365232a6de34a5dceaaa1fede275927f67e9ec1de0244e817900383f71599eff2fd4e3f72d4d7f5a321be24f70186eaf31dc4c07bfdf2adfed41b2618ad879225799d14083", &(0x7f0000000200)="d5bc3c6464bc534721949ce2898b54f44146919b0b3e0c3f7d989d9d1411c850ed5c1cfa4b5291fae569a46e76cf30026a181be97ab47c891b56eb2fa2790e89dc294880479151c357ea5a9f334eb8c5c2fe3fe9f38d0e72fa532afba817412d5629180fcd416469e194d49687c6dd8926af80c728059bb07baf2bcea98f6bb7d85ea38e82394c20e402eb464f6fcb92b31e5e704344f05dabe4d05424d71181c9b76e148229", 0xc4, 0xa6}) 10:55:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:07 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:07 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x101000) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) syz_emit_ethernet(0x3, &(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYBLOB="a09f66fb1f23e429dd4fea8c1ec50eb8ac5feb52c67a4aeb994494b35358e22d54e69103a57ba51f47210b1eb49644c5c1a910963148aa8f9031239c8d29ddedc25c1f2a4dd87f8495374db48b6a761354b9471f71ffd39d154790d45d2700758f3de95c80ed66bc341046a61f90087e6335e4daaabb03074e0499ef311ae67f51a6f788d31a60028bdade39edbe6ec8da483333f4eca4ee6660fa73d602000000827181a641dd50f42a2e2fcb560b419870d6cb0fa5b6273a8c01d902d8ebf00fddf0b5159e9c5c32a0ff045e47ee2ef3d37c477cb8b7f73af03e657c0b69dbbe4874e4aff4c48f0f6e03ba", @ANYRES64, @ANYRES16, @ANYRESDEC, @ANYRESOCT], @ANYRESDEC, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRES64, @ANYRESDEC, @ANYRESHEX]], 0x0) 10:55:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xd1, &(0x7f0000000000)=0x2, 0x4) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8921, &(0x7f00000000c0)={'team_slave_1\x00', 0x0}) 10:55:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x200000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:07 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl(0xffffffffffffffff, 0x0, 0x0) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x3f, 0x1) sched_setscheduler(r0, 0x2, &(0x7f0000000800)=0x80000001) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1ff, r2, 0x0, 0x0, 0x1}}, 0x20) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigaction(0x28, &(0x7f0000000140)={&(0x7f0000000080)="c42115f632427600c4a295b76ac5660f10ecf2446d6583880050b220013e400f7fefc4c2f934b600000000f2400fc21100c4c37bf0800000000000", {0x1297388}, 0x88000002, &(0x7f00000001c0)="f04283b6fd053451bbc4017b70c800c403c56982bf16000006c4425903cf66420f38dcfd8f2a50120c960900000066470f3adfb300f0ffff9765f00fb33fc4623545ef46d3e3"}, &(0x7f00000002c0)={&(0x7f0000000240)="6ca72665450f18ef66430f381517d2c1d027c4815d73df0b0ff23ce5000800003e6666460f57a16225000066460f72f23d", {}, 0x0, &(0x7f0000000280)="f043808c85cb12becee7c442f91700363ef3f08077000066440f6547d926f3af64400f01de660fe68ced8e00000065f7b508000000f246afc4c1d9d8d3"}, 0x8, &(0x7f0000000380)) r3 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40045402, &(0x7f0000001000)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000a80)='./file0\x00', 0x0, 0x0, 0x0, 0x2) 10:55:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:07 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\x17\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x10\x00\n\x00!!\x00\x00m\xc0', @ifru_names='bond_slave_1\x00\xff\xff\xff'}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @rand_addr=0xa09}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r2, &(0x7f0000000280)=0x4) 10:55:07 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:07 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x1b9) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1fff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:55:07 executing program 0: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5e303289b8d2a05e, 0x1}, 0xfffffffffffffeb4) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xdb, 0x101801) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000180)={0x6, 0x20, [0xa4b, 0x9, 0x8000, 0x800, 0x7, 0x20, 0x8, 0x2]}) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x44002) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) getsockopt$packet_buf(r2, 0x107, 0x1f, &(0x7f0000000280)=""/93, &(0x7f00000001c0)=0x5d) [ 2008.328858][ T4305] bond0: Releasing backup interface bond_slave_1 10:55:07 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:07 executing program 1: socket$xdp(0x2c, 0x3, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200800) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7fffffff) 10:55:07 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:08 executing program 1: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) fadvise64(r0, 0x0, 0x0, 0x2) [ 2009.120520][ T4315] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:55:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x400000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:08 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000400)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x30000, 0x0) recvfrom$packet(r2, &(0x7f0000000140)=""/227, 0xe3, 0x2100, 0x0, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000000)="7f31f7b47966477bd0617d88eaac13d1c12e63090309f847c2dffae4f18910985abba74f8c148bd420e523bc6b4c9a1b82bbf8dacd8490cc3ff20984d319d343bdf26b2388456156bb6bdd1871d3d981df4b08ef3737bf395acfcaa8d3c27986ee878108f8f5c670c645366ac03a6ce592c87261344e5019497695d3108978ee8a8ebea22555c86ecbf6d0e621ee86e35947ca3ecae39ec8e74da0a4c59b8c69df24e8dcde2bdeee1a8d104bd5642ebf525b662574401fc187d58b25fa198bac37d823360008a0e8561de3") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00090000f1a1c13cf97d115dd34dd2ae776d0d9d4d30c0bf8fcf54e48cd02f858087970c6773b7d65c544327db1efec5bce44b28afc4f5d478457a1ac5f3e1292dd51bbadfb01fd901c62757d7c12481e15ec7b0cb33b9bb726f986f53c05346e6a994412affee7d9e696b55ff68dcbefe2d0ed13a94369a87801200c85ed209c15ad53efceed4bb976477bd3f743193610b2bcc73d838e31960b7de937c5c74dab114307a62c54dbdbc20e9a450", @ANYRES16=r3, @ANYBLOB="00012dbd7000ffdbdf250e0000cd2ad31e695303f501f15e930008000600090000000800040007000000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000380)={0x7b, 0x0, [0xdb, 0x1ff, 0x7, 0xffffffff]}) listen(r2, 0xfffffffffffffffb) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 10:55:08 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x1, 0x0) bind$unix(r0, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r1 = socket(0x10, 0x80002, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xa000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x24, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x200000200}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20044080}, 0x4) prctl$PR_SET_ENDIAN(0x14, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000080)='teql0\x00'}) bind$rxrpc(r1, &(0x7f0000000240)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x24) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x200, 0x80200) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2400200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r2, 0x20, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x6}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000380)) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000280)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000640)=@assoc_value={0x0}, &(0x7f0000000680)=0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000740), &(0x7f0000000780)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000006c0)={r5, 0x4, 0x10, 0x800000000000, 0x40}, &(0x7f0000000700)=0x18) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 10:55:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:08 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000002c0)={'hsr0\x00', @local}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x100000000}, 0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x80000000, 0x4, 0x3}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x7fff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r2, 0xb3fc, 0x4, 0x4, 0x1, 0x3, 0x8, 0x2, {r3, @in={{0x2, 0x4e23, @rand_addr=0x6}}, 0x2, 0x4, 0x8, 0x62, 0x100000000}}, &(0x7f0000000280)=0xb0) socketpair(0x11, 0x800, 0x0, &(0x7f00000000c0)) 10:55:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r1) 10:55:08 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1840008913, &(0x7f0000000440)="0adc1f123c123f31810070ff5120595356c4b98623f39e13060000008026eb771fdc91b23ec2867a11395652804258") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000140)=[{{}, 0x1, 0x46, 0x200000000000002}], 0xfe12) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$update(0x2, r2, &(0x7f0000000100)="b54161efdac374fb454d6143da93b9fe4f66ef93f0bd3cf36c882604103952cd1d868c56a9e87c82dd28d8eabb09061d", 0x30) r3 = dup(r0) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000000)=0x3) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f00000001c0)=0x101, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000200)={r4}, &(0x7f0000000240)=0x8) 10:55:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvfrom(r0, &(0x7f0000000040)=""/165, 0xa5, 0x123, 0x0, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000640)='./bus\x00', &(0x7f0000000740)='cgroup\x00', 0x0, &(0x7f0000000840)='no\ne\x00') 10:55:08 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0xfffffffffffffffe, 0x0, 0x3, 0x1, 0x1, 0xc41c}) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r3, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x401) 10:55:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) [ 2009.547815][ T4378] e cgroup1: Unknown subsys name 'no [ 2009.547815][ T4378] e' 10:55:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x600000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:09 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a8}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:09 executing program 4: r0 = timerfd_create(0x400000000000002, 0x80000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x501000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x8000, 0x9, 0x4, 0x0, 0x9, 0x4, 0x0, {0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x3, 0x5, 0x9, 0x3e, 0x6}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x4}, &(0x7f0000000300)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') close(r0) preadv(r3, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x200) 10:55:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), 0x4) r1 = socket$inet(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000100)="0220", 0x2, 0x0, 0x0, 0x0) 10:55:09 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6a9}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2010.325946][ T4402] e cgroup1: Unknown subsys name 'no [ 2010.325946][ T4402] e' 10:55:09 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0xa001) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280)='ip6gretap0\x00', 0xe) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000), 0x4) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000540)) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@int=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000005580)={'vcan0\x00'}) clock_gettime(0x0, &(0x7f0000002f40)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002ec0)=[{{&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f0000000580)=""/222, 0xde}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000240)=""/36, 0x24}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/187, 0xbb}, {&(0x7f00000019c0)=""/144, 0x90}, {&(0x7f00000004c0)=""/127, 0x7f}, {&(0x7f0000001a80)=""/192, 0xc0}], 0x9, &(0x7f0000001c00)=""/226, 0xe2}, 0x6}, {{&(0x7f0000001d00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002e40)=[{&(0x7f0000001d80)=""/60, 0x3c}, {&(0x7f0000001dc0)=""/115, 0x73}, {&(0x7f0000001e40)=""/4096, 0x1000}], 0x3, &(0x7f0000002e80)=""/6, 0x6}, 0x100000001}], 0x2, 0x0, &(0x7f0000002f80)={r3, r4+10000000}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000018c0)=ANY=[@ANYBLOB="060000000000000000200000000000009e00000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/158], @ANYBLOB="00000000000000000570000000000000f900000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/249], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00\x00\x00\x00\x00\x00b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/98], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800000000000000", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB='\x00'/200], @ANYBLOB="000000000000000001500000000000008000000000000000", @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/128], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 10:55:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:09 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write(r0, &(0x7f0000000000)='P', 0x1) close(r0) close(r1) 10:55:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4000000000000e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @rand_addr=0xff}}, 0x0, 0xe2, 0x0, "f353c917e9422e5409e4dd29ae319c171904622a7a29752da0f76eccecb0f8c0866d084a141442ef491757f48396f10d7d2d004b4474bbb58e7846776c45defe8488f37df6896edac515d0571fd2508a"}, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400add427323b470c458c5602067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd0000001000020000000000000000cfb193e7ee00"/88, 0x58}], 0x1) 10:55:10 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6aa}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x700000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@mcast2, 0x0, 0x0, 0x3, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x32, "5ef778d6eec73ba64e5faef4d2c7031e9232e838c10aa9fdf8e929c9ce2916e802eef314ecf35a20bdcdaabb8df6ea6e1c4f"}, &(0x7f0000000080)=0x3a) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x8e6}, &(0x7f0000000100)=0x8) 10:55:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000d09dc7f2c578e11703077680c3d500220001002d7c047f08fbcd217d0be140bd70000000000004000000"], 0x14}}, 0x0) 10:55:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000001c0)={{0x9, 0x3, 0x3, 0x2, 'syz1\x00', 0x7}, 0x0, [0x0, 0x8, 0x9, 0x0, 0x5, 0xfd, 0xfff, 0x6, 0xffff, 0xf88c, 0x8, 0x7fffffff, 0x7, 0x7236, 0x7, 0x0, 0x1, 0x0, 0x2, 0x0, 0x9, 0x10f3, 0x3, 0x5, 0xed56, 0x200, 0xfffffffffffffffa, 0x100000000, 0x4, 0x80000000, 0x5, 0xc118, 0x7, 0x7fffffff, 0x0, 0x8001, 0x4, 0x8, 0x35a, 0x2, 0x100, 0xf26, 0x8000, 0x10001, 0x4, 0x59, 0x0, 0x7fff, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x1, 0x1f, 0xc0, 0xcf5, 0x1, 0x8, 0x6, 0x3, 0xcf, 0x4, 0x9, 0x100000000, 0x3f, 0xfff, 0x80000000, 0x0, 0x1f, 0x3, 0x1000, 0x2, 0xfffffffffffffffc, 0x8001, 0xffffffffffffff00, 0xfffffffffffffff8, 0x1, 0xff, 0xa8e0, 0x1, 0x4, 0x1, 0x8, 0x0, 0xb755d1a, 0xcf, 0x7fff, 0x1, 0xff, 0x4, 0xd0d5, 0x101, 0x1, 0x10001, 0x5a1, 0x8, 0x3, 0x9, 0x80000001, 0x2, 0x8, 0xb1d, 0x800, 0x8, 0x7, 0x2, 0x3, 0xf3e, 0x4, 0x20, 0x40, 0x10001, 0xffffffff, 0x1, 0x7, 0x5, 0x4, 0xe996, 0x4, 0x401, 0x100000001, 0x5, 0x5, 0x400, 0x8, 0xfffffffffffffc01, 0x2, 0xfffffffffffffffd], {0x0, 0x1c9c380}}) sendto$inet(r0, &(0x7f0000000000)="99", 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[], 0x102) shutdown(r0, 0x1) 10:55:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00'}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:10 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ab}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x1000000000040) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:55:10 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0x400}) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0xfffffffffffffffc, 0x80, 0x800}, {0x3, 0xfffffffffff7fffa, 0x1003}], 0x2aaaaaaaaaaaab7b) semop(r1, &(0x7f0000000240)=[{0x0, 0x20, 0x2000000000000000}], 0x1) 10:55:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00'}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) [ 2011.412286][ C1] net_ratelimit: 24 callbacks suppressed [ 2011.412296][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2011.422795][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2011.423980][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2011.430285][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2011.435570][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2011.447163][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2011.453093][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:55:10 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ac}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2011.458937][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:55:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x1}) dup2(r0, r1) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) [ 2011.492300][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2011.498248][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:55:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00'}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:11 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x800000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e23, 0x1000, @loopback, 0x5}, {0xa, 0x4e24, 0xbdb, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1f}, 0x0, [0x6, 0x80000001, 0x400, 0x7, 0x5, 0x1, 0x7, 0xffffffffffffbf9e]}, 0x5c) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7fff, 0x28100) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000500)=""/214) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000909000/0x18000)=nil, &(0x7f0000000640)=[@text32={0x20, &(0x7f0000000300)="66baa00066b8b21166eff20f01dfc4e175f90d01000000260f005300c744240000000000c744240218000000c7442406000000000f011424c4c17b70848900000000589a3dc00f816500670fc76900c4e13b10f9c4c250f31cee"}], 0x2bd, 0x40, &(0x7f0000000680), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000011c0)="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", 0x35e) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x5a9581, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r6, 0x8818564c, &(0x7f0000000680)) 10:55:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x1}) dup2(r0, r1) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 10:55:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x1}) dup2(r0, r1) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 10:55:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:11 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ad}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:11 executing program 1: r0 = socket$inet(0x10, 0x3, 0xd1) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="240000002d0007041dfffd946fa2830020200a0009000000001d8568ff0f000000000003", 0x24}], 0x1}, 0x0) 10:55:11 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ae}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0xa7f, 0x4263c0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{}, 0x0, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000002240)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000a40)=[{0xa0, 0x0, 0xfffffffffffffffb, "223511377c9ec2882a2cb36151c41a4fe5cbb99983fb29a9b70ff37d3bb254fc0a6f4327f043ee9b28fa9a8ca0ef51bf138b14bb5b2980f776b7be7cc566f1c1e3a8b9efa4eaf85895a98ebc6da49a471841f8b83b5be5ff17b180f917840a7a15ffe7fa1c9a8336d7774f42a48ad92a4823db0c1f6c544eb15639b4f32358e367bf36dba7f2a13947ee558a4b"}], 0xa0}, 0x401}, {{&(0x7f0000001cc0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}, 0x4, 0x4, 0x0, 0x2}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000001e80)="305d7a43d7318d94bc1a5e0d3e86e2dc2898d588b78a2dca61a6bbb5fb7808c100718a8ca9844e9e878b397868b32b54002a8592140f7a804e38af0c6bddf84a3acc5cdc07e5fadb4fefc10a66ed157f1b52a6cce5981b489aba6122df1c186ddb900531f988cd6aa69ac9ace2cb2f5bee619c42286ab3863765", 0x7a}], 0x1}, 0x10000}], 0x2, 0x4000) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000540)={0x0, r3, 0x2001f, 0xfffffffffffffffa, 0x81, 0x7}) r4 = socket(0x1e, 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x0, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000040), 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) futex(&(0x7f00000022c0), 0x7, 0x0, 0x0, &(0x7f0000002340)=0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x8, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$DRM_IOCTL_ADD_MAP(r5, 0xc0286415, &(0x7f0000000200)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x1, 0x40, &(0x7f0000ffd000/0x2000)=nil}) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000580)=0xac) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xf6) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 10:55:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x8000000003, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x7d, 0x0, &(0x7f0000000000)=0xfffffffffffffe30) 10:55:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x135, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x4000, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) 10:55:11 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6af}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x900000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x84, &(0x7f0000000040)=""/24, &(0x7f0000000100)=0x18) 10:55:12 executing program 0: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x2, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb8, 0xb8, 0x130, [@limit={'limit\x00', 0x20, {{0xfffffffffffffffa, 0x9}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x238) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) 10:55:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/219, 0xdb}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000200)=""/162, 0xa2}, {&(0x7f00000002c0)=""/189, 0xbd}, {&(0x7f0000000380)=""/77, 0x4d}], 0x3, 0x0) flock(r0, 0x7) r2 = getuid() r3 = geteuid() setreuid(r3, r2) 10:55:12 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x140206, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000140)="33ef36d009fd2a39fb21fdc8b97a9e9f83c16353e579a2802930af1e0694e36297"}, {&(0x7f0000000180)="bf091d483d0615848016329c03b5766724c695febd1684244cdd8a7a1b70e23c9226dccf5539a24c62c2bc52c88135b9dcec1c8ac7353a1a1a25b8df5fcefc2ebde8ce022e2cbbc4119abde961cf438b8cda783ea67af3afa1887891af19c80ce1e1809d7d37c3bc1e6ab5510d90a6b55ec8df80512259eb7effd7d61587bfdac994c10be6813296af0243c3669f685e87162a3a09505321ac38f778c29ec4d2885c00fa0c268669f78cf1e7723e78c1680c27a60fbc516d87247b4c55bdb6c5eb3d8b4b9da88603b97ddad7"}, {&(0x7f0000000280)="10f8ca1bbd3b17c28d1c58d9f42b46f9"}, {&(0x7f00000002c0)="6fb0f50aca"}, {&(0x7f0000000300)="f4f8d845da23a45010dc9e554234a4ecfbae3f87fab6ad4b81f5a4b160ec38c416850e8a2aa5e816331dcd1994dce0d7a7b495bab2dfe0ba8cc88a2e00204543706ce737be9ea4eb55fb20d06f67d34dd1ffa668de84608756baf96a8c65eaa107cea5161d25dfa8ab1bb1d21f9f98b625"}, {&(0x7f0000000380)="b8"}, {&(0x7f00000003c0)="ea9bef03c4b2a7eabbb0b2e102f1f1c70cf071a0829e75823f239bd31172141be5592e755210870f5c4eb7"}, {&(0x7f0000000400)}], 0xd67436ae0344f81) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x8}, &(0x7f0000000400)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000440)={r4, 0x7}, 0x8) 10:55:12 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0xc040, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x2, 0x7}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e20, 0x8, @local, 0x5}}}, 0x84) getsockname(r0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r2, 0x4}, &(0x7f0000000040)=0x8) r4 = getpgid(0xffffffffffffffff) process_vm_readv(r4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/182, 0xb6}], 0x2, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/121, 0x79}, {&(0x7f00000005c0)=""/117, 0x75}, {&(0x7f0000000640)=""/117, 0x75}, {&(0x7f00000006c0)=""/234, 0xea}, {&(0x7f00000007c0)=""/58, 0x3a}, {&(0x7f0000000800)=""/243, 0xf3}, {&(0x7f0000000900)=""/159, 0x9f}], 0x7, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r3, 0xfff, 0x20}, &(0x7f0000000100)=0xc) write$binfmt_script(r1, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'vboxnet0'}, {0x20, 'md5sumbdev'}, {0x20, '/dev/autofs\x00'}], 0xa, "e513457867be8d70da81ee57e624f066b31ec9df4272f0e2c2e2e50b9771c80c9bb819c2e9dc5d702590af4f74afe49e90718190fba57bada2de9d800d6c9f08051339209859c4085a980803a6725f37803682ff2bd0d0a19ab1da2ed9e6eb409b570373620bddb52d9e40999db7eab354237efbd1090beadd29d70d59513515ea672195ae5a5c65f0d28e5a402e8a316d0f09255c15b72b963ff191c63eab9823b5a4dfea6fcd5b833632ab553df464f8de34aa257acdf7514d048b66895383cba7b071a27c5ac6268ae14ee1cb4d46dd2a3e8e0203e1ee957462f51aa14160426b89d9bf198d456dc44c2668ae1ea7de09"}, 0x11e) 10:55:12 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x19}, 0x28, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f00000000c0)='bpq0\x00', 0x5, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x1) prctl$PR_GET_SECUREBITS(0x1b) getsockname$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000640)=0x3a) getrusage(0x0, &(0x7f0000000700)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000003c0)=0x7ffffffe) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000001c0)=""/121) unshare(0x40000000) 10:55:12 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)=0xfffffffffffff330) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000780)=@nat={'nat\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000800)={r3, @in={{0x2, 0x4e23, @empty}}}, 0x84) 10:55:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x40000000002, 0x3, 0x80000000002) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x100000000000005, &(0x7f0000000080)=0x7, 0x4) r3 = dup3(r1, r0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, 0x2, {0xe744}}, 0x18) [ 2013.272895][ T4551] x_tables: eb_tables: snat target: only valid in nat table, not nat [ 2013.466522][ T4554] IPVS: ftp: loaded support on port[0] = 21 [ 2013.612113][ T4564] IPVS: ftp: loaded support on port[0] = 21 10:55:13 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xa00000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:13 executing program 0: syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r0 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getsockopt$inet6_int(r0, 0x29, 0xfb, 0x0, &(0x7f0000000180)) timer_settime(0x0, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 10:55:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffe6, 0x0, 0x22d, 0x0, 0x1f2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, 0x0) preadv(r0, &(0x7f00000017c0), 0x19d, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) 10:55:13 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x20}}, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x18400) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) [ 2013.963130][ T4570] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 10:55:13 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4609ff05fe060000000000000003000000040000007b000000380000001c0100008000000001002000020000000400ffff0000000004000000b48e00000000000009000000000000003f000000fdffffff0100000090b3da872733f6bc4e43ae0f0ea9dc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/2407], 0x967) 10:55:13 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2014.025385][ T4570] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 10:55:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffffe6, 0x0, 0x22d, 0x0, 0x1f2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, 0x0) preadv(r0, &(0x7f00000017c0), 0x19d, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) [ 2014.088278][ T4587] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2014.152949][ T4587] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 10:55:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8953, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r2, 0x70c, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3f}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x4000080) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') 10:55:13 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:13 executing program 0: syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r0 = fcntl$dupfd(0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) getsockopt$inet6_int(r0, 0x29, 0xfb, 0x0, &(0x7f0000000180)) timer_settime(0x0, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) [ 2014.411806][ T4606] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2014.468383][ T4606] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 10:55:14 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xe00000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000140)=0x1) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x10) 10:55:14 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:14 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) flock(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000140)={0x5fea, "317cdfde362339892e7166f0c17d09c9861c8377c40671459636b91b42e18a03", 0x7, 0x1, 0x2, 0x12000, 0x4, 0x2, 0x5, 0x4}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f00000000c0)=0x98) 10:55:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0xfffffffffffffffd, 0x24012, r1, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x3, &(0x7f0000008000/0x2000)=nil) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x4, 0x0, [{0x9, 0x4, 0x0, 0x0, @irqchip={0x1, 0x1}}, {0x5, 0x7, 0x0, 0x0, @irqchip={0xb0, 0x8}}, {0x0, 0x2, 0x0, 0x0, @adapter={0x5, 0x9, 0x200, 0x1, 0xc3f9}}, {0x7ce0859b, 0x1, 0x0, 0x0, @msi={0x6, 0x2, 0x1ff}}]}) 10:55:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x40200) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000280)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000001240)={{0x3, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x0, 0x5}) 10:55:14 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000940)={'syz'}, 0x0, 0xfffffffffffffffb) r0 = request_key(0x0, &(0x7f0000000a00)={'syz'}, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x500, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x5, 0x8}, {0x3, 0xa873a1e}, 0x10, 0x1, 0x1}) add_key$keyring(0x0, &(0x7f0000000ac0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000b80)='id_legacy\x00', 0x0, 0x0, 0x4e6, r0) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc1205531, &(0x7f000035dffc)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1ffe1917, 0x200100) sendto$rxrpc(r3, &(0x7f00000000c0)="67e38e88b9d77e5ec7893dc813da7bb4086d5f6f1476d97ec88c8c7786b7005b263e2d840bac3ccf2c3c0b1d1c6acebdbaf4", 0x32, 0x0, 0x0, 0x0) 10:55:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc000, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(0x0, 0x0, 0x200) bind$rds(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) 10:55:14 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) flock(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000140)={0x5fea, "317cdfde362339892e7166f0c17d09c9861c8377c40671459636b91b42e18a03", 0x7, 0x1, 0x2, 0x12000, 0x4, 0x2, 0x5, 0x4}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f00000000c0)=0x98) 10:55:14 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2015.377017][ T26] audit: type=1326 audit(1556189714.853:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45bbfa code=0x50000 [ 2015.423295][ T26] audit: type=1326 audit(1556189714.873:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 [ 2015.448206][ T26] audit: type=1326 audit(1556189714.883:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45bbfa code=0x50000 [ 2015.472045][ T26] audit: type=1326 audit(1556189714.883:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x458d99 code=0x50000 [ 2015.495353][ T26] audit: type=1326 audit(1556189714.883:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45bbfa code=0x50000 [ 2015.520366][ T26] audit: type=1326 audit(1556189714.883:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 [ 2015.546179][ T26] audit: type=1326 audit(1556189714.883:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 [ 2015.569118][ T26] audit: type=1326 audit(1556189714.883:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 [ 2015.593770][ T26] audit: type=1326 audit(1556189714.883:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 [ 2015.617026][ T26] audit: type=1326 audit(1556189714.883:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4648 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x458d99 code=0x50000 10:55:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2000000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000940)={'syz'}, 0x0, 0xfffffffffffffffb) r0 = request_key(0x0, &(0x7f0000000a00)={'syz'}, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x500, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x5, 0x8}, {0x3, 0xa873a1e}, 0x10, 0x1, 0x1}) add_key$keyring(0x0, &(0x7f0000000ac0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000b80)='id_legacy\x00', 0x0, 0x0, 0x4e6, r0) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc1205531, &(0x7f000035dffc)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1ffe1917, 0x200100) sendto$rxrpc(r3, &(0x7f00000000c0)="67e38e88b9d77e5ec7893dc813da7bb4086d5f6f1476d97ec88c8c7786b7005b263e2d840bac3ccf2c3c0b1d1c6acebdbaf4", 0x32, 0x0, 0x0, 0x0) 10:55:15 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b8}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x407, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x1e, 0x1, "e4ebf5ff2987772c3452b9476bb805f90fc1fbbe89840e17caeb3c58dadb8461806da3d6a9ba14793e2d932c33a127e6c53222c493e254f5c2b2a1c2cfa1e41c", "fc47b51e2a5d0c81c4954c359dcbec8f4e35d5c86298cb44c226010440ed9e5f", [0x2, 0x1]}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb8, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffc00}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc54}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setuid(r3) write$binfmt_script(r0, &(0x7f0000000580)={'#! ', './file0', [{0x20, '.!vmnet0lobdev'}, {0x20, 'TIPCv2\x00'}, {}, {0x20, 'syz0\x00'}, {0x20, 'syz1\x00'}], 0xa, "b60677997fe57a5b70c596b2cb49f705d61f5b90d16a6aa10ba143217ecbb2d8e3682c62be44e614e8ebba5f2a0d9baf9c0d6ba5945699a7c164ba64bb1a6874b54b64e6d2ee4962e70a0f9fd3bdf80e7e5adb07508ec74731b5614e0a3a0e9f859cb856660ae864c56dfe0ba502443fd23b2586ca472a81aa6ce9c89d63b75fbb61b9859a0c1d0bad8f45bf2e79049abe"}, 0xc0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000640)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000680)={r4, 0x80000, r0}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000006c0)='bond_slave_0\x00', 0x10) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000700)='syz1\x00', r0}, 0x10) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/184}) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f00000008c0)="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") ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000018c0)={0x7200000000000000, 0x13000, 0x6, 0x4, 0xe}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000001900)={0x80000000, 0x8, 0x6, 0x1, 0x5}) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000001940)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001980)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000001a00)={0x6, 0x118, 0xfa00, {{0x101, 0x7f, "5cc35dac05473a5bc505a101cb7d7c04459c64f6b02c151c836fbf05bb909384cf847b7a0f0b83122e8302a886eb0d481fb559bcda87e2943b75ebd92f6a4768f0cff9ba83adf07113a39fc7a674300ed39f7cb692dd903cbe479b401f8856e45caf6553d244d4661b54b01743bb60cb9d013e557acbcbd23175c4d59b9f4aa254207507b083a4d99893ac32dbfd4afdf436e01f0c0f5419f2e3fba9265bc8f7bfa06351bcd8510577a3aaaf6d5cdc0b597ae9875b62eedc312406e7c4c779e2c90df0646eccef27a9dfcb4b9b58702bd110c7e3b8398a23852aacd23e3cf6de48ad9c5df915f3d0163eebc5c1bb847ad902e1e289205e0d2346df1c6ca4173c", 0x12, 0xffffffffffff8000, 0x7fff, 0x44a, 0x7, 0x5, 0xffffffff, 0x1}, r6}}, 0x120) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000001c80)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x8010}, 0xc, &(0x7f0000001c40)={&(0x7f0000001bc0)={0x4c, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r7) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000001cc0)={0x0, 0xaf, "4db51227dd5a5fb778a9cedff8bb537fc7005c156700d3ba519b1caca5333a4f36b43af6e1bf9877af8455226fe3d56f3c3f3cb302a4c6b2a80fb5da99d6adbf594a6f6b48999c90448d3d66297ad172be774ca365129ee6072d7dea10d0fb914dfac028f482ff692e7815624ef71174beebc66c347dba3babc96ca91adf512a8b300673a05a9c404182f9137d6498fe64fff96039e98a80a3a153d43c0685fd1c116c9ba83a90622650cdc70d7792"}, &(0x7f0000001d80)=0xb7) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001dc0)={r8, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, 0x200}}}, &(0x7f0000001e80)=0x84) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000001ec0)={0x15, 0x2, 0x8}) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000001f00)='/dev/loop0\x00', &(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)='fuseblk\x00', 0x4000, &(0x7f0000002080)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@measure='measure'}]}}) 10:55:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3000000000b, 0x0, 0xfffffe53) 10:55:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) shmget(0x2, 0x14000, 0xc00, &(0x7f00008f3000/0x14000)=nil) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000040)=""/49) getdents64(r1, 0x0, 0x0) ioctl(r0, 0x0, 0x0) mremap(&(0x7f0000525000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000117000/0x4000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r2, &(0x7f0000b58000)=0x200000, 0xffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ptrace(0x421f, r3) 10:55:15 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6b9}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:15 executing program 1: r0 = open(0x0, 0x0, 0x3) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002780)={{{@in6, @in6=@initdev}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6, 0x1000000]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) dup(0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000000)={0x16, 0x75, 0x0, {0xb, "68c1d82cc75440da511a56"}}, 0x16) 10:55:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000940)={'syz'}, 0x0, 0xfffffffffffffffb) r0 = request_key(0x0, &(0x7f0000000a00)={'syz'}, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x500, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x5, 0x8}, {0x3, 0xa873a1e}, 0x10, 0x1, 0x1}) add_key$keyring(0x0, &(0x7f0000000ac0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000b80)='id_legacy\x00', 0x0, 0x0, 0x4e6, r0) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc1205531, &(0x7f000035dffc)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1ffe1917, 0x200100) sendto$rxrpc(r3, &(0x7f00000000c0)="67e38e88b9d77e5ec7893dc813da7bb4086d5f6f1476d97ec88c8c7786b7005b263e2d840bac3ccf2c3c0b1d1c6acebdbaf4", 0x32, 0x0, 0x0, 0x0) 10:55:15 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ba}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05", 0xe) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x48d) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = epoll_create(0x37b20727) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000080)={0x40000000}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0)=0xe1, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008107e00f80ecdb4cb9d9056319041a000f00000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 10:55:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x2c01000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:16 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6bb}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe2$9p(0x0, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x7, 0x1}) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000300)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000140)={0x0, 0x1}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x4, 0x3, 0x5, 0x1, 'syz1\x00'}, 0x6, 0x20000000, 0x101, r1, 0x9, 0x2, 'syz1\x00', &(0x7f00000000c0)=['keyring\x00', 'keyring\x00', '/dev/bus/usb/00#/00#\x00', 'GPLvmnet1-+\x00', 'syz', '\x00', 'syz', '\x00', '/(\x00'], 0x3c, [], [0x8001, 0x4a6, 0x7, 0x9]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x0, 0x2) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x200001) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 10:55:16 executing program 1: r0 = open(0x0, 0x0, 0x3) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002780)={{{@in6, @in6=@initdev}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6, 0x1000000]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) dup(0xffffffffffffffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000000)={0x16, 0x75, 0x0, {0xb, "68c1d82cc75440da511a56"}}, 0x16) 10:55:16 executing program 4: getpid() r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f00000001c0)="2600243e11ba4721050000000000000005001f000a4a51f1ee6c9cd53400b007cb5b00000000", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x80000000000008, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x138, r1, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xbad6}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x53fc7b82}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe33}]}, 0x138}, 0x1, 0x0, 0x0, 0x40050}, 0x11) 10:55:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x12000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000100)={0x9048, 0x3, 0xffffffff7fffffff, 0x0, 0x0, [], [], [], 0x369, 0x10000000}) bind$tipc(r1, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x4, 0x4}}, 0x10) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @remote}}, 0x14) 10:55:16 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6bc}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:16 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6bd}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:16 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000000)={0x0, 0x6208000000003, 0x713003, 0xffffffffffffffdd, 0xfffffffffffffffe}) 10:55:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:16 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6be}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2017.652311][ C1] net_ratelimit: 29 callbacks suppressed [ 2017.652320][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2017.652353][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2017.658381][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2017.676658][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2017.682527][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2017.688394][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2017.695195][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:55:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x3f00000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:17 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x16bf47c2dc386d50) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) sendmsg$xdp(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)='J', 0x1}], 0x1}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 10:55:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x800000016, 0x40000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) sendmsg$nl_xfrm(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 10:55:17 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6bf}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000140)={r2, 0x2}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0xa2, 0x0, 0x11e}, 0xc100) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x0, 0xfffffffffffffe7c}, 0x0) [ 2017.732317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2017.738434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2017.744533][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:55:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1, 0x4c3, 0x18}, 0xc) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}, 0x1c}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0xf, "bffdd662ce0fe173e93276db3f7a82"}, &(0x7f0000000240)=0x17) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000280)={0xc6e5, 0xd5, 0x4, 0x2, 0x401, 0x7, 0xfffffffffffffff7, 0xfffffffffffffffb, r4}, 0x20) 10:55:17 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:17 executing program 1: prctl$PR_SET_FPEXC(0xc, 0x2) r0 = socket(0x2000000000000021, 0x2000000002, 0x2) r1 = accept4$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x23e) sendmmsg(r0, &(0x7f00000009c0)=[{{&(0x7f0000000200)=@ipx={0x4, 0x4b1b, 0x2, "416607955b5b", 0x5}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)="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", 0xfa}, {&(0x7f0000000380)="a28c0e20b53be38e1cf9d99d8f0d7e9af393ad125a6cb60db2cccb49943501649444da88be2a5b6a475e183be0413c25291be2c30822ca2b7538a27b5dbc905797deaf0dfc6bd5407aaa8b32d0f9366b3e75ebda58c165f0cffb949611efc5196c7122eaff23da34ee422ca720b0b45d64c2d2fef67eb94118b639b466f327368400144c85233b7b3e477af7e5ef6c010d18efc8df225fd34c37bebba4e97f103025adefab0eafb70c5b3bc5a8505b0490fee7aca25abb1d77cfba1d91bbad6ef9b00aa3ea45ccb71c6beafc8831ce6f1089a70d89b4", 0xd6}, {&(0x7f0000000480)="012a9cabd4d922291aac7dd51db2ea091b667d6a6ba2682dd12eb548d7ae96dd31ab55e292c72e18aa", 0x29}], 0x3, &(0x7f0000000a40)}, 0x36}, {{&(0x7f0000000540)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)="080c4676c329e5b0cd00df5dccc9ec82095e605872e2b86e1df651bad84b88eb1bbfa4d96ba4fb6ddefd2d20582aca85c684195a52b1", 0x36}], 0x1, &(0x7f0000000640)=[{0xe8, 0x11d, 0x3, "8ab24d8a595b4afd29647c5f8502be0812c432add34164f50207005a2a69d2e277aaf6a931cc2a25a7b54da305cdb937b175ec8cee0cdd07eec2ceab4eae5afa036b969b0bc0976c89baaca8d25b89b01c588b49266128c0d41e3f8fc4be104c8d9cf8efc6306ceb188a8870fa4f294b58dd84029d1752fa54b3450d00916f4f8d1d44b69dcd2a8ff99bbb1a50f110f7546b7a3d1df08d80a0408b15b05cbe08c197aaa7fa5720f63c2276359eb85257d809bf27cee5c0c5960bc2333cebf87e604ee557284355d52247ec6da4f57c34476209f2d5a361"}, {0x38, 0x102, 0x7, "a17c4f98b81f3df76fcbd57527ac464ea01ef07150f81f6031f43d8f5bab2c58921c2b75260abe"}, {0x100, 0x13f, 0x100000000, "904b62bea957e8432d197259224be9b382a11a2c22e21d328b9c0dece299248e88bb7c3e93fdb101388f782c1f77bebf0514722d37b985a66fbfead3672a321caf5d86f62cce92d17f64e50b9bb7f04712dd1e38e1118ebb3dca8ea55232a32c2494229d8a9cbd7f7264c69725fefa8306befc62cc34d5dfb4ce22da54037141b6aa9f2ac16909fbffbfaf61c6b502c641e985313f72c252b77926396665c58c13ce6535d381d988fe1f0ff474aa2356168f35a6946a41c5a01930895010f4d4182ef74c6199ea79132f1f517e6f703f0e03072b6ff9a5c0850abd7eaefaee9bb1052688752c947fecc75810610a"}, {0xa0, 0x10f, 0xeed, "5333816c818187878d14cf2a3af365d0bf88763446022d1a2cc74d39fe0564fb453e0a8d8dee45169901e04b53e4c6d872a91d3ee9da6cfe7989ee250538c114b59a289dc6efc89466b9746b7df971375dc0867d1ad9c20355b1d151da912918b96ef8543d15e41e930b7b609db474844f84fece51cb496f40906a76b724d9b323130bd88af580ca0d"}, {0xa8, 0x117, 0x20, "c593ac1c183aaaed172b861507c4c10431d39f45151e282c9532782b58eda6ced002d357fd93f612c175516b427bb494fcb0142e36753feddd1f6311cab366b18afa71679a998e9c60fec0af439341205663c946a26826a8520e92ed289dbd14e4e7d7c4d018382fef1d7ba3efab326e8d95cb254abbe07c76d741a3c973f5320a4c5e81566ec3942cd7d345a1f80aa475aa61"}], 0x368}, 0xffff}], 0x2, 0xfffffffffffffffe) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xc0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x400002, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f00000001c0)={0x9, 0x4c47504a, 0x3, @stepwise={0x7f, 0x4, 0x2, 0xfffffffffffffffb, 0x7, 0x7fffffff}}) 10:55:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123d319bd070") r1 = socket$inet(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="240000001e0007041dff18946f6105000a0000001f00000000000800080008000400ff7e280000001100ffffd716a0aa1c0900000000000012000000000000eff24d8238cfa50223f7efbf76", 0x4c}], 0x1}, 0x0) 10:55:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:17 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000660007081dfffd940101830020200a000900000000000004000000000d00ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8f4, 0x4000) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000080)=0x6) [ 2018.053286][ T4789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2018.270395][ T4800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:55:18 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x5400000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:18 executing program 1: ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000200)={0x5}) 10:55:18 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="8d"]) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x5}}, 0x20) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:18 executing program 4: r0 = gettid() r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mkdir(0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) ioctl$KDENABIO(r1, 0x4b36) mincore(&(0x7f0000304000/0x4000)=nil, 0x4000, &(0x7f0000000300)=""/195) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40) symlink(&(0x7f0000001000)='./file0\x00', 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000480)='ip6_vti0\x00', 0x10) capget(&(0x7f0000000140)={0x39980732}, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040)=0x80000000, &(0x7f0000000180)=0x2) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x3, 0x0) ioctl$sock_ifreq(r1, 0x893b, &(0x7f0000000080)={'vlan0\x00', @ifru_map={0x0, 0xb3a, 0x97, 0x0, 0x100, 0x6}}) write$vnet(r2, &(0x7f0000000400)={0x1, {&(0x7f0000000240)=""/144, 0x90, 0x0, 0x2}}, 0x68) 10:55:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x30000, 0x0) timerfd_gettime(r1, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) 10:55:18 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x7}, 0x8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 10:55:18 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x1, 0xffffffff00000000, 0x1, 0x0, [0x0]}}, 0x29) 10:55:18 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x22d) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0xf0, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x5}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) 10:55:19 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000140)={@loopback, @empty, 0x0}, &(0x7f0000000180)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@gettfilter={0x44, 0x2e, 0x200, 0x70bd28, 0x25dfdbfd, {0x0, r3, {0xb, 0x3}, {0x6}, {0xb, 0xffff}}, [{0x8}, {0x8, 0xb, 0x100000001}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x44}, 0x80) r4 = signalfd4(r2, &(0x7f00000002c0)={0xfffffffffffffdb0}, 0x8, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_tgsigqueueinfo(r0, r1, 0x2e, &(0x7f0000000340)={0x0, 0x0, 0x2}) read(r4, &(0x7f0000481000)=""/128, 0x80) 10:55:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xac14140000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(0x0, &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:19 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:19 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:19 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x4001, @u64}]}, 0x14}}, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) fchdir(r0) 10:55:19 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3f, 0x22000) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x8, 0x1, 0x5, 0x100000000, 0x0, 0x3, 0x100, 0x2, 0x4, 0x100000000, 0x400, 0x0, 0x9, 0x9, 0x3, 0x6, 0x6, 0x7, 0xe3bc, 0x7, 0x80000000, 0x3ff, 0x43, 0x8, 0x5, 0x1f, 0x80, 0x7f, 0x89c5, 0x0, 0x7ff, 0x6000, 0xd2c, 0x72874331, 0xe7e, 0x8, 0x0, 0x8, 0x0, @perf_config_ext={0x2, 0x5}, 0x1, 0x2, 0x0, 0x1, 0x802, 0x2, 0x6}, r0, 0xf, r1, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x20) syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x500, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000080), 0x4) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x9, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000000)=[@enter_looper, @dead_binder_done={0x40086310, 0x3}, @clear_death={0x400c630f, 0x1, 0x2}, @acquire_done={0x40106309, 0x0, 0x3}], 0x0, 0x0, &(0x7f0000000b80)}) prctl$PR_GET_DUMPABLE(0x3) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) 10:55:19 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:19 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/.yz1\x00', 0x1ff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x9, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000480)={0x0, 0x4, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000015c0)=ANY=[@ANYBLOB], 0x1) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x20141043, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100)={0x4, 0x3, 0x5}, 0x8) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000001240)=0x7fff, &(0x7f0000001280)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000001180)='IPVS\x00') perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x2, &(0x7f0000001080)=@raw=[@initr0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) io_setup(0x0, &(0x7f0000000080)=0x0) io_destroy(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) 10:55:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(0x0, &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:19 executing program 0: syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)='\x00', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r1, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 10:55:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a05000000123f319bd0704b7804562a514e8cb6ae0f9ee8391c6b258a022d27c58aa808653d44f4411982d9690b197e4e18a44dc3103f52364982560c5e2376907f5216e849795f4099d602e9841098720df1e47d72f9b424d2c6a50933e45395124d39385eaa12fcb540c8b2b25cc30d6660fc46f7a6572716d720b7594aacc7b8036827e039a0001a6cdc0be863f31a8c3fbecfb6deefa86e5a1f33ec1dd83acb00a03ef1e92a01ef990f431ddb2bc32008b2e0bdafd1274667029db99302aef8ddd89a15be9cd7ef046e52647e69a2d9d6f88eefc7ffd03b6d9a2ab7bbc944c82004fdf71891d4921fab214ff6a2faec4ecbb48f0c2adeeaa040e62382ea4f6127d98b329b04fe14f1ae1eafdc8d1545e1fd2d07430a2ff438bd46608729250d21b1fc6479963021a680fae797d4d84200000033fc81642bef6fdfe682b08c44db5d8a2aa550a05277fb783f5c747190760bbacbe3115be185a2df96b3627786376caf3aea8c7f9f939c99eaa147ccb111516d0f964ae23702bb649e929c578786f14a688d") r1 = dup2(r0, r0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000000)={0x2}) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000380)=0x8, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x400, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 10:55:20 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xe803000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:20 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:20 executing program 0: syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)='\x00', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r1, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 10:55:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0xffff7ffbbfffffff, 0x6, 0x0, @buffer={0x0, 0xe9, &(0x7f0000000080)=""/233}, &(0x7f0000000040)="9b247f9c1793", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYRES32=r0], 0x34) read(r1, 0x0, 0x0) 10:55:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(0x0, &(0x7f00000001c0)={'syz'}, 0x0, r2) 10:55:20 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000040)=0x4, 0x4) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/80, 0x50}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x3, 0x1, 0x9, 0x2, 0x82}, 0xfff, 0x88, 0x1}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x10000000000002e0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000200)={0x6, 0x4, 0x7, 0x6, 'syz0\x00', 0x8001}) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 10:55:20 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c8}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:20 executing program 0: syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)='\x00', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000280)={r1, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 10:55:20 executing program 4: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x2, 0x2000) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r1) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8012, r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) 10:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4004000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r2, 0x0) ioctl(r1, 0x40084142, &(0x7f00000000c0)="0479b05785d0d771ef2cfe181224485ce471ee87a9f4b4a0d0ed56dc97da1d85151760703e") 10:55:20 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000080)=0x100000000001f, 0x194) sendmmsg(r2, &(0x7f0000003d40), 0x4000094, 0x0) 10:55:20 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6c9}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xf401000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, r2) 10:55:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='/dev/snd/seq\x00', 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x404000, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x4}, &(0x7f0000000240)=0xfffffffffffffee4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r1, 0x10e}, &(0x7f00000002c0)=0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0xc4541) 10:55:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@updsa={0x104, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in=@remote, 0x0, 0x3c}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x3}, [@coaddr={0x14, 0xe, @in6=@dev}]}, 0x104}}, 0x0) r1 = semget$private(0x0, 0x2, 0x20) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000580)=""/70) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dsp\x00', 0x800, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) r3 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000006c0)=""/4096) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x1, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x7, @bearer=@l2={'eth', 0x3a, 'batadv0\x00'}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x80) sendmsg$nl_netfilter(r3, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x12010212}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x124, 0x3, 0xb, 0x400, 0x70bd2b, 0x25dfdbfc, {0x3, 0x0, 0x5}, [@typed={0xc, 0x95, @u64=0x1}, @typed={0x30, 0x8, @str='^vmnet1^\'#*proceth0,posix_acl_accessem0user\x00'}, @generic="5c93d0f1adfbd9c5d057c94cdd558d41aa0cbca92347608bba57e5cafafb10fb497a863145b4f9001688422da0e1d9cd53785aca0ddb2cf57d81e89903", @typed={0xc, 0x5c, @u64=0xff}, @generic="48bc8773cd53f1d5bd07b9f30f1cdf09d6250d782b3b484c2ef866d607603fedb614e6ba8985cba59134eb8765eb9e6e8f8d31178ea0f32f351c07be5fa0c7667dfa58dcad8fbc64c05c6f6aa11bf0298e7967d0037eb7f5ff7587efb716328dff05fb36cc6fed971710718f18ac207c", @nested={0x18, 0x27, [@typed={0x14, 0x17, @ipv6=@loopback}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x84}, 0x94) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000600)={0x6, 0x8, 0xa977, 'queue1\x00', 0x10001}) 10:55:21 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ca}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = dup3(r0, r0, 0x80000) write$P9_RWSTAT(r1, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={0x0, @initdev, @local}, &(0x7f0000000200)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vcan0\x00', r3}) bind$inet6(r2, &(0x7f00000001c0), 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x0) 10:55:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000080)="c4c17973dc44400fc79cd20000000043adc4219610c0410f0fe0b6440fc7a8fc830000f245ad420f2213410f1ebc768e1b000066b893000f00d8"}], 0x99, 0x0, 0x0, 0xfffffffffffffe00) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0xc) ptrace$pokeuser(0x6, r4, 0x7, 0x100200000000001f) 10:55:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4000000000000030, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) listen(r0, 0x2) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0xe) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 10:55:21 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6cb}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:21 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x80000001) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000140)=0x3) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000000)={[0xd000, 0x100002, 0x17001], 0x1, 0x28, 0x8}) 10:55:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, r2) 10:55:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x8000, 0x54) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) ioctl$void(r1, 0x5450) getsockname$unix(r2, &(0x7f0000000680), &(0x7f0000000640)=0x3f) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000180)={0x8, 0x461, 0xc2d, 'queue0\x00', 0x5}) pipe2$9p(&(0x7f0000000040), 0x80000) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRES16], @ANYRES32], 0xc) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000100)={0xf, 0x6, 0xcbd, 0x80000}) getrusage(0x0, &(0x7f0000000700)) unshare(0x40000000) [ 2022.307351][ T4996] IPVS: ftp: loaded support on port[0] = 21 10:55:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfc00000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:22 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6cc}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0xffffffffffffffff, &(0x7f0000000080)=""/127, &(0x7f0000000100)=0x7f) 10:55:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, r2) 10:55:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, r2) 10:55:22 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6cd}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:22 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ce}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10080}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x7d6061b483b60ec2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9da}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x122}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000180)={0x5, 0x10, 0xc7, {0x0}}, 0x18) 10:55:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:22 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6cf}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:22 executing program 1: r0 = memfd_create(&(0x7f0000000380)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x3, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r2, 0x4, 0xc00) ioctl(r2, 0x1000008912, &(0x7f0000000000)='\np\x00\x00\x00\x00\x00\x00\x00\x00\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) sendmsg(r1, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x36100cb1eac21bc2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000440)={0x0, 0x0, {0x101, 0x8, 0x0, 0x8, 0x9, 0x3, 0x3}}) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7a307a30950f00732d07e727a3f8e59fe37b79d2d0bed9c51df73ef842d1bd76f4039bd4c53426e0"], 0x28) r4 = dup2(0xffffffffffffffff, r0) r5 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r6 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000300)={&(0x7f0000000240), 0xc, 0x0}, 0x0) pwritev(r6, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) mlock2(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x1) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000000)=0x4) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x2183f, r5, 0x0) fcntl$setstatus(r5, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f00000000c0)={@hyper}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010005000000000002000700", @ANYRES32=0x0, @ANYBLOB="04ef01000000000008000000", @ANYRES32=0x0, @ANYBLOB="10000200000000002000070000000000"], 0x34, 0x1) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100)=0x4caf, 0x4) sendfile(r5, r6, 0x0, 0x80003) [ 2023.892277][ C1] net_ratelimit: 24 callbacks suppressed [ 2023.892285][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2023.892321][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2023.898112][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2023.915561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2023.921424][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2023.927320][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2023.933165][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2023.972312][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2023.978188][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2023.984297][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:55:24 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = accept4$packet(r0, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000080)={@mcast2}, &(0x7f00000000c0)=0x14) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'vcan0\x00'}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x8044) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getgroups(0x5, &(0x7f0000000280)=[0xee01, 0xee00, 0xee00, 0xee01, 0xee01]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getgroups(0x6, &(0x7f0000000400)=[r4, r5, r6, r7, r8, r9]) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000440)={0x5, "0888b59589d6ad542d88a3d1d10204e7b1d34a6c069de0e1d35af8ef41ec8fa9", 0x1, 0x1}) syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x401, 0x80) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}}, 0xc58, 0x3ff, 0x6, 0xfffffffffffffa9c, 0xfffffffffffff22e}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x1, 0x7, 0x5, 0xf36f, 0x80000000, 0x32, 0x1, 0x2, r10}, &(0x7f0000000600)=0x20) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000640)) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000680)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000006c0)={0x17, 0x1, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xc0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0xafdb, 0x0, 0x0, 0x0, &(0x7f0000000780)={0x4, 0x100000000}, 0x0, 0x0, &(0x7f00000007c0)={0x80000001, 0x7, 0x100000000, 0x5}, &(0x7f0000000800)=0x1ef42a20800000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r3, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000700)='em0}em0([]\x00', r11}, 0x30) ptrace$getregset(0x4204, r12, 0x201, &(0x7f0000000a00)={&(0x7f00000009c0)=""/18, 0x12}) statfs(&(0x7f0000000a40)='./file1\x00', &(0x7f0000000a80)=""/2) lsetxattr(&(0x7f0000000ac0)='./file1/file0\x00', &(0x7f0000000b00)=@random={'system.', '\xafem0system\\&Q\x00'}, &(0x7f0000000b40)='/dev/cec#\x00', 0xa, 0x1) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000bc0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000e00)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000c00)={0x19c, r13, 0x42c, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xde}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5265}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6ddc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdb75}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4080}, 0x40) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000e40)=@assoc_value, &(0x7f0000000e80)=0x8) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x24, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7fff}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x800) perf_event_open(&(0x7f0000001000)={0x1, 0x70, 0x3, 0x0, 0x7ff, 0x100000000, 0x0, 0xd7, 0x100, 0x4, 0x20, 0x0, 0x7, 0x0, 0x5, 0xfffffffffffffff9, 0x1, 0x3, 0x1ff, 0x5, 0x81, 0x6, 0x2, 0x6, 0x3f, 0x6, 0x1, 0x4, 0x0, 0x1, 0xffffffff, 0x1, 0x2dc1, 0xc0, 0x1, 0x6, 0xffffffff, 0x3, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000fc0), 0xc}, 0x400, 0x3, 0x7, 0x0, 0x7f, 0x6, 0x3}, r3, 0xe, 0xffffffffffffffff, 0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000001080)=0x666, 0x4) 10:55:24 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x4140) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x6, {0xa, 0x4e22, 0x3f, @mcast1, 0x3}, r1}}, 0x38) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) writev(r2, &(0x7f00000021c0)=[{&(0x7f00000000c0)='>', 0x1}], 0x1) 10:55:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x5) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [{}]}, 0x58) ioctl$int_in(r0, 0x800040c0045009, &(0x7f0000000280)=0x4) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0x18) 10:55:24 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfcff000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:24 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xce, 0x800}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000016c0)=ANY=[], 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001c40)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000140)={0x74, 0x5, 0x0, 0x3ff, 0xfffffffffffffffb, 0xfff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x4e21}, 0xffffffffffffff56) connect$inet(r2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r2, r3}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000080)) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b40)}, 0x0) 10:55:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)={0x10}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)={0x2, 0x0, [{0xa, 0x2, 0xb59, 0x100000001, 0x7}, {0x0, 0x2, 0x28, 0x7f4f, 0x3f}]}) r3 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0x0, 0xef, 0x100000001}) open(&(0x7f0000000000)='./file0\x00', 0x480000, 0x40) ioctl$SG_IO(r3, 0x1274, &(0x7f0000000680)={0x53, 0xfffffffffffffffc, 0x70, 0xd9, @scatter={0x3, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/132, 0x84}, {0x0}, {&(0x7f0000000400)=""/98, 0x62}]}, &(0x7f0000000500)="99675e155ed9485ca769045760ff558071d6963536cf20306ff952f733d6f91c72afcfa182ff62d69be1a7dcb1e13420754ac7f274775d551dd1b3da8f8d6ba1759f17c2fe1c0249f627ea3a01fb89c3f1d21c17219db68b7e8a4d979e89117d670dd955c558c73b56a935424484bfe3", 0x0, 0x0, 0x10000, 0x2, 0x0}) 10:55:24 executing program 1: socket$kcm(0x2c, 0x203, 0x0) socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x381600, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x1}}, 0x18) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="39000000140081ae0000dc676f97daf02ccc690e3fb23858af8423300b2c000500058701546fabca1b4e7d06a6580e88370200c54c1960b89c", 0x39}], 0x1}, 0x0) 10:55:24 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) r1 = memfd_create(&(0x7f00000000c0)='cpuset\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x10000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000140)=0xee6d00000000, 0x4) write(r1, &(0x7f0000000180)='4', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x800011, r1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0x2, 0x0, 0x0, @remote}}}, 0x98) 10:55:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @mcast2, 0xb}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) readlink(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) acct(&(0x7f0000000180)='./file0/file0\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40}, 0x10}, 0x70) socket$packet(0x11, 0x3, 0x300) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x900000000000000) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{}, {0x0}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000340)={r3, 0x7, &(0x7f0000000140)=[0x3, 0x4, 0x1000, 0x7ff, 0x1, 0x1, 0x808d], &(0x7f0000000180), 0x0, 0x4, 0x9, &(0x7f00000001c0)=[0x8, 0x330, 0x9, 0x2], &(0x7f0000000300)=[0x7, 0xffffffff, 0x4, 0x6, 0x5]}) 10:55:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f0c3c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0xfffffffffffffc00) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="0000445cb9762f801ef4b5de4c3a0314000000000000"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 10:55:24 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:25 executing program 5 (fault-call:7 fault-nth:0): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:25 executing program 0: creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000100)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff85, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x5}, 0x28, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x206) [ 2025.594679][ T5108] FAULT_INJECTION: forcing a failure. [ 2025.594679][ T5108] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.641136][ T5108] CPU: 1 PID: 5108 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2025.649083][ T5108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2025.659167][ T5108] Call Trace: [ 2025.662487][ T5108] dump_stack+0x172/0x1f0 [ 2025.667023][ T5108] should_fail.cold+0xa/0x15 [ 2025.671735][ T5108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2025.677568][ T5108] ? ___might_sleep+0x163/0x280 [ 2025.682454][ T5108] __should_failslab+0x121/0x190 [ 2025.687417][ T5108] should_failslab+0x9/0x14 [ 2025.687438][ T5108] kmem_cache_alloc_node_trace+0x270/0x720 [ 2025.687463][ T5108] __kmalloc_node+0x3d/0x70 [ 2025.697777][ T5108] kvmalloc_node+0xbd/0x100 [ 2025.697860][ T5108] alloc_netdev_mqs+0x98/0xd30 [ 2025.697943][ T5108] ? tun_show_owner+0x170/0x170 [ 2025.697966][ T5108] __tun_chr_ioctl+0x178d/0x3ee0 [ 2025.721680][ T5108] ? retint_kernel+0x2d/0x2d [ 2025.726294][ T5108] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2025.731962][ T5108] ? tun_select_queue+0x7d0/0x7d0 [ 2025.737014][ T5108] ? retint_kernel+0x2d/0x2d [ 2025.741638][ T5108] ? tun_chr_compat_ioctl+0x30/0x30 [ 2025.746855][ T5108] tun_chr_ioctl+0x2b/0x40 [ 2025.751465][ T5108] do_vfs_ioctl+0xd6e/0x1390 [ 2025.756081][ T5108] ? ioctl_preallocate+0x210/0x210 [ 2025.761215][ T5108] ? __fget+0x381/0x550 [ 2025.765400][ T5108] ? ksys_dup3+0x3e0/0x3e0 [ 2025.769842][ T5108] ? tomoyo_file_ioctl+0x23/0x30 [ 2025.774800][ T5108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2025.781196][ T5108] ? security_file_ioctl+0x93/0xc0 [ 2025.786333][ T5108] ksys_ioctl+0xab/0xd0 [ 2025.790516][ T5108] __x64_sys_ioctl+0x73/0xb0 [ 2025.795162][ T5108] do_syscall_64+0x103/0x610 [ 2025.799789][ T5108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.806307][ T5108] RIP: 0033:0x458d99 [ 2025.810219][ T5108] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2025.829839][ T5108] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2025.838277][ T5108] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2025.846268][ T5108] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2025.854257][ T5108] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2025.862247][ T5108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2025.870406][ T5108] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfdffffff00000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:25 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="b4000000000000007a0a00ff000000009500000000001c00"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x2000000]}, 0x48) 10:55:25 executing program 4: r0 = socket$inet(0x10, 0xa, 0x3) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010807041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:55:25 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:25 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0xff, 0x8, 0x4, 0x8, 0x0, 0x101, 0x40006, 0x6, 0x3, 0x5, 0x96, 0xffffffff, 0x6, 0x0, 0x1, 0x1000100000000, 0x0, 0x91d, 0x8001, 0x2, 0x0, 0x9, 0x538, 0x2, 0x1, 0x4, 0x0, 0x1, 0x81, 0xffffffff, 0x45d, 0x3e0c8614, 0x7f, 0xfff, 0xfffffffffffffff8, 0x401, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x8000, 0x8, 0xfffffffffffffef6, 0x6, 0x6, 0x8, 0xff}, r0, 0xe, 0xffffffffffffff9c, 0x2) syz_open_dev$midi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fd\x00') getdents64(r1, &(0x7f0000000000)=""/116, 0x8001) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 10:55:25 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x80600, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x9, 0x8000) write$apparmor_exec(r1, &(0x7f0000000380)={'stack ', '/proc/capi/capi20ncci\x00'}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r2, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) sendmsg$nl_crypto(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=@upd={0x118, 0x12, 0x501, 0x70bd2c, 0x25dfdbfe, {{'aegis128l-aesni\x00'}, [], [], 0x2400, 0x2000}, [{0x8, 0x1, 0x9}, {0x8, 0x1, 0xfc00000000000000}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0xffff}, {0x8}, {0x8, 0x1, 0xfffffffffffffffe}]}, 0x118}, 0x1, 0x0, 0x0, 0x40000}, 0x90) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x9, 0x7, 0x100000000, 0x0, 0xffff, 0x14800, 0xa, 0x0, 0x7cb, 0xffffffff, 0x2, 0x9, 0x9fe9, 0x4, 0x7fffffff, 0x20, 0x69, 0x6, 0x0, 0xffffffffd573c192, 0x7, 0x3, 0x6, 0xffffffffffff8000, 0x5, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffd, 0x9, 0x5, 0x1f, 0x846, 0x2, 0x100, 0x3, 0x0, 0x3, 0x6, @perf_config_ext={0x8, 0x8}, 0x30, 0x100, 0x6, 0x1, 0xffffffffffff7fff, 0xffffffff, 0x8}, r4, 0x7, r2, 0x2) 10:55:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x40, &(0x7f00000000c0)=0x2) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000001c0)) connect$tipc(r1, &(0x7f00000002c0)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x3}}, 0x10) getpeername$unix(r1, &(0x7f0000000200), &(0x7f0000000280)=0x6e) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000004080501ff0080ffedfffbae3ee3fb000c0003002f00001c7d0a00010c0002000002fa17711104a6"], 0x2c}}, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000300)=0x8) ppoll(&(0x7f0000000100)=[{r1, 0x2000}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x8) 10:55:25 executing program 5 (fault-call:7 fault-nth:1): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) [ 2026.476066][ T5145] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2026.511473][ T5148] FAULT_INJECTION: forcing a failure. [ 2026.511473][ T5148] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.527366][ T5145] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 2026.544808][ T5148] CPU: 0 PID: 5148 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2026.552777][ T5148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2026.562856][ T5148] Call Trace: [ 2026.566176][ T5148] dump_stack+0x172/0x1f0 [ 2026.570536][ T5148] should_fail.cold+0xa/0x15 10:55:26 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2026.575143][ T5148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2026.575174][ T5148] __should_failslab+0x121/0x190 [ 2026.575191][ T5148] should_failslab+0x9/0x14 [ 2026.575209][ T5148] kmem_cache_alloc_trace+0x4b/0x760 [ 2026.575236][ T5148] __hw_addr_create_ex+0x5e/0x310 [ 2026.590659][ T5148] __hw_addr_add_ex+0x1ef/0x2b0 [ 2026.590683][ T5148] dev_addr_init+0x118/0x200 [ 2026.590699][ T5148] ? dev_mc_flush+0x40/0x40 [ 2026.590722][ T5148] ? __kmalloc_node+0x4e/0x70 [ 2026.619650][ T5148] alloc_netdev_mqs+0x142/0xd30 10:55:26 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2026.624523][ T5148] ? tun_show_owner+0x170/0x170 [ 2026.629658][ T5148] __tun_chr_ioctl+0x178d/0x3ee0 [ 2026.634648][ T5148] ? tomoyo_init_request_info+0x105/0x1d0 [ 2026.640398][ T5148] ? tun_select_queue+0x7d0/0x7d0 [ 2026.645473][ T5148] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2026.651323][ T5148] ? __fget+0x35a/0x550 [ 2026.655504][ T5148] ? tun_chr_compat_ioctl+0x30/0x30 [ 2026.660727][ T5148] tun_chr_ioctl+0x2b/0x40 [ 2026.665165][ T5148] do_vfs_ioctl+0xd6e/0x1390 [ 2026.669773][ T5148] ? ioctl_preallocate+0x210/0x210 [ 2026.674898][ T5148] ? __fget+0x381/0x550 [ 2026.679123][ T5148] ? ksys_dup3+0x3e0/0x3e0 [ 2026.683570][ T5148] ? tomoyo_file_ioctl+0x23/0x30 [ 2026.688523][ T5148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2026.694793][ T5148] ? security_file_ioctl+0x93/0xc0 [ 2026.699940][ T5148] ksys_ioctl+0xab/0xd0 [ 2026.704132][ T5148] __x64_sys_ioctl+0x73/0xb0 [ 2026.708774][ T5148] do_syscall_64+0x103/0x610 [ 2026.713389][ T5148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2026.719305][ T5148] RIP: 0033:0x458d99 10:55:26 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d8}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2026.723214][ T5148] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2026.742836][ T5148] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2026.751267][ T5148] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2026.759253][ T5148] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2026.767249][ T5148] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2026.775358][ T5148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2026.775367][ T5148] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 [ 2026.787232][ T5156] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2026.857530][ T5156] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 10:55:26 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfe80000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:26 executing program 0: msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/217}, 0xe1, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="09cc480a9d6a177d0e0fe603999a900b5de7f44fe546e57fbd2050bb46d36989cbfe2e1bcf694a07d89f11756042f19c67868cc99774d4b6d715b0da1dbc2ce706a6ca98f5e774a7cd393a681613a6d73e7ace8c222af0f1b89d101d377f227d40a4103d215cf0b20b8beb33394247c1765eccf3762ed71217af39b7e697964b046d22db79311a69b69c63978ab674716740f7b1009976fe13b5dc9e3c42cf3dc1f32fe9bc0267a652582c5853bae8d6405b6b5a0f2c811d8a741b2c9dde8f55", @ANYPTR64=&(0x7f0000000040)=ANY=[], @ANYPTR, @ANYRESOCT], 0x4, 0x800) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 10:55:26 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x4000000000002) syz_emit_ethernet(0x6c, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x67d4b64efae07af1, 0x4b) sendto$rxrpc(r2, &(0x7f0000000380)="6600752bb71de2a83fce58cd73ae2bba713427a915c1201ea35e5435462a0626cad3ac1aa6dcff6ab71129450003db28d91227cddb8f5439aed5", 0x3a, 0x4004000, &(0x7f00000003c0)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @multicast1}}, 0x24) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000004c0)={@broadcast, @initdev, 0x0}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@rand_addr="b118c0238c2b9157d4cc6230e0899106", @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x2, 0x4e21, 0x3f, 0x0, 0x80, 0x80, 0x3e, r3, r4}, {0xec8b, 0x9, 0x100, 0x4, 0x3, 0x10001, 0x80000000, 0x7ff}, {0x10001, 0x1000, 0x5, 0x1}, 0x401, 0x6e6bb2, 0x1, 0x0, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3505, 0x3, 0x0, 0x9, 0x1, 0x2c}}, 0xe8) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80, [], 0x1a}, @in=@local, 0x4e23, 0x0, 0x4e20, 0x48, 0xa, 0xa0, 0xa0, 0x87, 0x0, r5}, {0xfff, 0x7, 0x8, 0xffffffffffff0001, 0x7, 0x4, 0x10001, 0x8}, {0x6, 0x1, 0x1, 0x3}, 0x24, 0x0, 0x1, 0x1, 0x1}, {{@in=@multicast2, 0x4d2, 0xff}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x0, 0x6, 0xa500000000000, 0x0, 0x1f}}, 0xe8) 10:55:26 executing program 5 (fault-call:7 fault-nth:2): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:26 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6d9}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:26 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000080)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)="2f20c862aaea95a41aceb5c147ea9c2b246a77d85823bd86a512a260313d29b4801de2e37101f7b0a3b90ac3d0ba36665bd28644c14af545339d742f6c93c90e439da20b058cd952096bf73985effafc78845bc2d1c8ebb5aac688c814e063419721ca392e249884adfcfe141e87ec5d8a3eeb5a762751ba49d9226d", 0x7c}, {&(0x7f0000000200)="aa9a2ed557ac295181841c611548e4dead1e6bbaccd372e78c94aba0a7809b2fe04a0125b86f7eb60364a59f57273e4a0d528b6f5597031cfd226ac7cb1c44709317b8caedca06b8d8ecae1a333005ab437055ee9e546029f46e8c3a4536b7d3d2e70351541dc1504c1cdf06dbf3ef8f5bbcde06e0c9ab734ee1d970d1b65b469d660d023e00c996ba406a674f37cd8b687b98dd7c8b80db6b59337803eb4c3b672d961b301aabf80a97149dbb1ba7b2ddd8604e4986", 0xb6}, {&(0x7f0000000000)="ab5666310c01a18e14695738562d0393b220ea1efa0ff010ad46a391af81bd7ef3f3926d02394853f44842", 0x2b}, {&(0x7f00000002c0)="a7c516e207d41bd569057185c2abf880cbacffac884abfad78b283d3c61d0ba8081a1bdcd30dbe742d88d80285f6829652290a95704902689d24b9e1423870f11c56eb96c06575138a17af905f98010c607f61d4f9a04e0d7fd8eb755fa255ecbf921573f33c288c7ff5fd615a3803316365f926cca1a0f9c9f0a2a916757ff677e6cb32456eda563e0749e3dcc824b4fb485fbc5e5ef897ad637d597b66f6dc9487a05aaea2c88016abfd64b0a9263f", 0xb0}, {&(0x7f0000000380)="87361aa0bcba5d8df02784f46fb4ce0648981d08390a465c8de944fd09cbaeaa75242fcc85d45cf2c43782125db08879855b0ce1e184c45911c776c397cba8b79aa2c7b1138c1f3076a94d7b4526d74da8b5da589f656dbe6b219abe92374dd7b9433911448aea22536833acf0306e6509705904f613d4840a17886700ed3cb7900c3fa0888371257b0e8b825be85c9502cff639fd6416a815a313005ba7c71d745fd545d855213879c98dbd99910d7b60e918283a6b0a16d7d0d6c9a6a7086b38e016f2df371924d3b8066254b2e8825b3c14857fa6e75b5d76eae766820b916cd9c50a093789096f9c4b46dab75feefe1386", 0xf3}], 0x5, &(0x7f0000000540)=[{0x78, 0x11, 0x1000, "25cbe638132e63c8517aafde17f5990eba671f4bff2ab37b8f7be51e63225a408dced5db0cf14aaee206064e55e78db051171f5ce1913af9a4012e86ab9261ea571167287eebd25c50c83f59510b121eeada953d7c08b80ef335ce56b0800bc5aca02793079303d9"}, {0xf8, 0x10e, 0x7fff, "c422624a719dee9b231bdbc5cc3b7d5ba684283ddc436db56a94a05da2af064e919831b8c90cbe0d3fdadb4f2870d1308150595eeab078c4a821bea925487aaaaeddc6a6fa25c20d884591ba04aaa9c5a1ecefdddcf5db7ed2c1c3e53e459f8b20680f1caac93a9cb57ebd7df3a53e7d23a360c89d96e6dc04bd6ea252d14fd99420e61968079d58a75a1934e89f62941c1a91754e8f04ff29a5f02ae5a44e58662e1190bd0055ac1244101c65af5b60e83ba2d4caf10e715d042e549fae672514e356d5277606bb0297b4a4ec0f49afcdbf5eeab6609adec30d4cec0f8c1f927e"}], 0x170}, 0x811) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="12000000000000001100000067000000bbde"], 0x12}, 0x10) [ 2027.066752][ T5176] FAULT_INJECTION: forcing a failure. [ 2027.066752][ T5176] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.098433][ T5176] CPU: 0 PID: 5176 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 10:55:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000180)=""/103) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000100)={0x6, 0x1}) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x800000000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 10:55:26 executing program 1: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000000)='fuseblk\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000180)='./file0\x00') umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000000002) mount(&(0x7f0000000640)=@md0='/dev/md0\x00', &(0x7f0000000680)='./file0/../file0/file0\x00', 0x0, 0x1000, 0x0) [ 2027.106407][ T5176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2027.118987][ T5176] Call Trace: [ 2027.122304][ T5176] dump_stack+0x172/0x1f0 [ 2027.126662][ T5176] should_fail.cold+0xa/0x15 [ 2027.134304][ T5176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2027.140665][ T5176] ? ___might_sleep+0x163/0x280 [ 2027.145543][ T5176] __should_failslab+0x121/0x190 [ 2027.145561][ T5176] should_failslab+0x9/0x14 [ 2027.145586][ T5176] kmem_cache_alloc_node_trace+0x270/0x720 [ 2027.155038][ T5176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2027.155056][ T5176] ? dev_addr_init+0x17f/0x200 [ 2027.155077][ T5176] __kmalloc_node+0x3d/0x70 [ 2027.155090][ T5176] kvmalloc_node+0xbd/0x100 [ 2027.155114][ T5176] alloc_netdev_mqs+0x67f/0xd30 [ 2027.155131][ T5176] ? tun_show_owner+0x170/0x170 [ 2027.155148][ T5176] __tun_chr_ioctl+0x178d/0x3ee0 [ 2027.155163][ T5176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2027.155180][ T5176] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2027.155201][ T5176] ? tun_select_queue+0x7d0/0x7d0 [ 2027.211438][ T5176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2027.216970][ T5176] ? tun_chr_compat_ioctl+0x30/0x30 [ 2027.222191][ T5176] tun_chr_ioctl+0x2b/0x40 [ 2027.223843][ T5190] e Filesystem requires source device [ 2027.226622][ T5176] do_vfs_ioctl+0xd6e/0x1390 [ 2027.226646][ T5176] ? ioctl_preallocate+0x210/0x210 [ 2027.226662][ T5176] ? __fget+0x381/0x550 [ 2027.226685][ T5176] ? ksys_dup3+0x3e0/0x3e0 [ 2027.226709][ T5176] ? tomoyo_file_ioctl+0x23/0x30 [ 2027.264732][ T5176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2027.270977][ T5176] ? security_file_ioctl+0x93/0xc0 [ 2027.276117][ T5176] ksys_ioctl+0xab/0xd0 [ 2027.280277][ T5176] __x64_sys_ioctl+0x73/0xb0 [ 2027.284874][ T5176] do_syscall_64+0x103/0x610 [ 2027.289460][ T5176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.295375][ T5176] RIP: 0033:0x458d99 10:55:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x408c5333, &(0x7f0000000040)={{}, 'port0\x00'}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x2100, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="00004e00329c1f9f26bca00b84b89fa09c505497b71797d1c8926b52e02096ee1b7b5d284f3d19b01bc605ecf530760fc52459a7631a6702594d77875003ec685c426bbd59e85b192fd12e0b7a48edc0c98ff0e0d459c75f6592cb670d84f7c517036b6aefaea491d4045daf5cac3a155197c81cb12b465f47473c3d47f19ce9b33e53f020831aff12123430dbbd2ffe829fcb6d13e4b9025a7620ca8c13107d06f81d3b28a1480cd1a870696c19dec9eb407f2fd1afbbfa13c61e300247dbcfc4b36bccf54bea669be188ef8b5aed71ea72b69ccb079988b60b688536321409a08de2d7875215934af1d9cfea977712d493f59969a06541174a63c6ec1f94fe8e783aac39740783fea67873955440850edc060efe5bdf41d4ad2d72e8ee5781fdd961d24e2be43c6c17aeb6b480c4f3f2fd3703500237a5ad366f1befa1f7d4de33bf52c48a4eafb347"], 0x56) prctl$PR_GET_TSC(0x19, &(0x7f0000000100)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) 10:55:26 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6da}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2027.299284][ T5176] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2027.318933][ T5176] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2027.327353][ T5176] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2027.335878][ T5176] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2027.343891][ T5176] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2027.351883][ T5176] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2027.359883][ T5176] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 [ 2027.407797][ T5190] e Filesystem requires source device 10:55:26 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c000000000000000000aa005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501f03bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4c2a6300c1d5d4"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket(0x90000000010, 0x3, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e7ef007b1a41cd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000280)=[{{&(0x7f00000000c0)=@rc, 0x0, &(0x7f0000000180), 0xd0, &(0x7f00000001c0)=""/30, 0x24a}, 0x20}], 0xdd, 0x0, 0x0) 10:55:27 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6db}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:27 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfec0000000000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:27 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/4096) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000001040)={0x2000}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000001080)={0x7, 0x9, 0x1, 0x401, 0x4, 0x1cb017d6, 0x0, 0x1ff, 0x9be, 0x7ff}) r1 = syz_open_dev$sg(&(0x7f00000010c0)='/dev/sg#\x00', 0x100, 0x10000) sync_file_range(r1, 0x80000000, 0x6, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001100)=0x0) fcntl$setown(r0, 0x8, r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000001140)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000013c0)={r0, 0xc0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=0x7f, 0x0, 0x0, 0x0, &(0x7f0000001200)={0x9, 0x8}, 0x0, 0x0, &(0x7f0000001240)={0x4, 0x7fff, 0x0, 0x100000000}, &(0x7f0000001280)=0x1d, 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=0x6}}, 0x10) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2b, &(0x7f0000001400)=""/185, &(0x7f00000014c0)=0xb9) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', 0x44000, 0x10) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001540)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000001580)={0x631744ce, 0x757b577e, 0x3, @discrete={0x4, 0x1000}}) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000015c0)=0x1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000001600)=0x50d, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001640)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x20) io_uring_enter(r0, 0xe, 0x1, 0x3, &(0x7f0000001680)={0x100010000000}, 0x8) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f00000016c0)={0x3, 0x8}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000001700)={0x5, 0xa, 0x4, 0x104000, {}, {0x5, 0xc, 0x0, 0x1f, 0x1, 0x7f, "132c9ea3"}, 0x7f, 0x3, @offset, 0x4}) r4 = syz_open_dev$mouse(&(0x7f0000001780)='/dev/input/mouse#\x00', 0x4, 0x10000) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f00000017c0)={0x2, r0}) sysfs$1(0x1, &(0x7f0000001800)=']eth1em0wlan1-ppp0\x00') ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000001840)) ptrace$getregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000001880)=""/211) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 10:55:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f00000000c0)=0xfff, 0x1) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0xd, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x101000, 0x0) sendmmsg$alg(r2, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="6e0bfcf5f977ec5e5abe3499001a0e2ed1b33df7aa9b2b5daf9fd97671f9f4655cdc6c0f7953f17ee6280e918d8b2b354b96851113c04deade3be2394c766cb1964283cbdae2012716282eb55960e3f5c436eab4d6791d01c79dff273068462559aba63211280bfc972d8f8052e448c463aa5efbc76c587a34da07d097ff4bb4d975f46896", 0x85}, {&(0x7f0000000240)="b8715c9decc57173bde1726185b3b872ac8b54cdae4b99c9caadb879ffb412da7257a6ad3744a1fdb4551e3edd524eb058d7967a4e85875b780608a47ef65672b890e624251203f324e89af9f2f7969ec49dc4475b0ecb832237f7de0c7eb8323f45ddca3c", 0x65}, {&(0x7f00000002c0)="9260568c256a25dafe9d97e369d79a97e4deb3b422ec30a52a5c7829f2e861bbcb25a8cb576eec4b3f1fe197e472b8fdc9f5ce19bc77d6a8b9562401b34e3d621ac7700c6c1b02f8cd77c0404a5698e9438b7161613c301f1b608c3b983726e5763e634175ff2b7bd1c506f55c5485a6034d7c7b6fda24c7c6698aee040d5d22a32b6c6a17506daa87b7959f9dfcae836118281c79ba1197f7587e689935953190dd32620be96c7d3f4d9143b755cc0fcb643b8b966e531a06c9a6e543fdda9dc8f453a8a3e4596033d986b83d", 0xcd}], 0x3, 0x0, 0x0, 0x4000004}], 0x1, 0x80304402591cdca3) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000440)={0x5, 0x9}) 10:55:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000003, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\x00\x00\x00\x00\x00\x00\t0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1025, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f00000000c0)={0x1, 0xc00000000}) 10:55:27 executing program 5 (fault-call:7 fault-nth:3): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:27 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6dc}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:27 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x2) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/38, 0x26) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x400, 0x0) fstat(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee01]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0}, &(0x7f0000000c40)=0xc) getgroups(0x2, &(0x7f0000000c80)=[0x0, 0xffffffffffffffff]) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000dc0)=0xe8) r8 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000e00)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000f00)=0xe8) r10 = getegid() getresuid(&(0x7f0000001340), &(0x7f0000001380)=0x0, &(0x7f00000013c0)) r12 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001580)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file1\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001780)={0x0, 0x0, 0x0}, &(0x7f00000017c0)=0xc) fstat(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001880)=[0xee00]) sendmmsg$unix(r2, &(0x7f0000001a00)=[{&(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000480)="9076a066865c3d54afebe229adfbbe", 0xf}, {&(0x7f00000004c0)="fd8d13c9280358e29e20f528b42bfdcc704a220dd2a209a1e34d5d6d966bd050435042b6128500262c8424a598dd48a52d8856f6a35526583a4f4f5955ab6ad2a3a0aacd1ab5379dbf8a7310e7d331dc9caaf90e", 0x54}, {&(0x7f0000000540)="c21279b03194961100d1705dca936151285b9813921a076b3550b56250450698ebf7da162091cb8c5491f70569db148c689d27bf6af5b5c9db3c19d78a43743e7cd26a048e1e1fbf5add07737a82850c3478d12d5fab1785f149f59fc555319d1d779ff93997d49e9b3440d2f5cf14096f80", 0x72}, {&(0x7f00000005c0)="345ff3452da1cbce6ab2f6d95d50fb75f94500980b7a9435c0f9cb84990c14dd5555d177fa4a0ebe52b1eedabb95edae8b", 0x31}, {&(0x7f0000000600)="9c7eea6c166b90d15139a54f59ef4390e24c0111252ecd3cc28148f9f93b0ea296cffc37b10a484454417bc24e16d89d02bd79f1271568695fe1009c3e617d821d41b5f49ae850f2a724720f1290f5a05d653617ee70d27f808e524a800cf6a42fefd64d96282d6ee92231daf9c63a4ff772f8f117ef1a7865a6321f6192be74760db84b1c8d1c8616f8d70bf913c1c1c9273f60825e24d359556806e26e11b001eb4939a2eb196b101c4281b253488db7bcd348d84dca3d3a0b874c62b67a20c7fe", 0xc2}, {&(0x7f0000000700)="5f57fbe329319e6e59ce71ca759c58c6e00f17f3d3662e359b22d341341edf7f8cc06c2edf1f496427e6f8dfcfc2205b03be8e3a6918624453973151982521603ee5ff1c21ecc7eab6e96e1152044cab704e8a72bae8b66dc3247a56af5e6d0dec8167dd29312e7a3280a21a828534c3020d82513628c5fa744dbda0b7eb1d46516bc0a0b67e86abced71de9a49ef24949d4321c542030ba7be4f22e702e5e1b465370a075b607767ed967ee51fca9efa0ca10bc478fc746ca167da039290b77181547fc894bcbfca938ecfdcc04", 0xce}, {&(0x7f0000000800)="e657d666512cb664e5656173f45916bafbe45dcc6650da144bae5bfbfad75214ae2be5c04ed718c45319fe158767aa2a7626d64d9ea153ceebcad62a4e02bb674b4fd5", 0x43}, {&(0x7f0000000880)="69fbae6069cfdf786c5248ad3eb33e5ce4ff775fed19be6253bd0892d7326d3d692382c4ff524a45a56838365f67c9c47ac945e026f15d7b52fe5c5d9f155a839c88521daee348d460b5dfce3580eb1d166008511b217ec82003c6dfb7d99f2b737acb8b1caeb8462e8f86a78e66137e1bcceb4707ae753ecf342b26558e640916d891749cd310b55dda1a256cc1a37920fe0bc73f3082538ce98315f1e86fb04384216f36eb89aeb337e51e52370adedd1e67183b192b5021df817528fd26892c792c", 0xc3}, {&(0x7f0000000980)="c19e44f1358d7c487664bdab0542ca978be2c9e83a7b72b016e65cd0b87a9d314890007f82974d179b489d52134a8cf7079e56c4a3dbcc086cff34124361d88e766b90d7ee6148ad0442d72bbc7787a83062d79126a102a7ba21caf5af794b3652614d6c2918af1ab42090b1b13a80d39b239370a67241e6b42c7af4ea0ddee4a52cdaaaf93f86d1b4c9dc6afa1c934b3c0eb470ccd3a29caf20b938344a863901fd54e170f4bed62204525a73ab5adfcf14", 0xb2}, {&(0x7f0000000a40)="c011a7c957d2b2fe3cdf2ccfd57db534484741554ec00046a2c7a120bc", 0x1d}], 0xa, &(0x7f0000000f40)=[@cred={0x20, 0x1, 0x2, r1, r3, r4}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r2, r2, r2, r0]}, @rights={0x20, 0x1, 0x1, [r0, r2, r2, r0]}, @cred={0x20, 0x1, 0x2, r1, r5, r6}, @rights={0x28, 0x1, 0x1, [r2, r2, r2, r0, r0]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x38, 0x1, 0x1, [r2, r2, r0, r0, r0, r0, r0, r2, r2, r0]}, @cred={0x20, 0x1, 0x2, r1, r7, r8}, @cred={0x20, 0x1, 0x2, r1, r9, r10}], 0x148, 0x800}, {&(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001300)=[{&(0x7f0000001140)="d7121ef5860f758171057a9a0ecb728e7044969383f566be9306ed083bdf4e8963ae4e43eaaa024edd3768499c69f819d13d72e3b6446506a6ceb3f5b08fb09aaaea7833e90a8202e5033e91138515992eeb69dd63354d8390ad324bc361dafb1186a56e9355498e6f17e8e276e9bbbd007acc0bcdaf06245e38e1339d8ba101e2d6c22df2f07b2f0ae403ab0d3efe9867ac005bb6765ecb2e564fe734854f5565ee90413cbdd50f25f893e52674468e1ff82e57a657a7910af1e462852cdfbc1a3dc8984fae9877388387437c3e136c498102510c1dd59a3a889e20b24102c489cfa9e358b6a6e9c2e5752361db4ba53d", 0xf1}, {&(0x7f0000001240)="4699c7b7e523f36463dd06e6380c247109d36a82cdcd1999a4126ba15cd12fb240c31e29f23dd81d37bdec2bc6a48f1ccd85f3bb9f03faacdf5de3a1e4d659a922b9be4b3bfbf87af166c1cbcccf7a520f861ae2bbda17fb3606de709bf18c3fd409c6a8ae4a901ee68b9652dda74de07b01c58d92e00f726ed94abdbe37c1972ab3a2fa4f2a4d3e5d74ee0de8db829b320420a8b1fe5b0cda215dfa0579ec", 0x9f}], 0x2, &(0x7f0000001400)=[@cred={0x20, 0x1, 0x2, r1, r11, r12}], 0x20, 0x4}, {&(0x7f0000001440)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001540)=[{&(0x7f00000014c0)="5942efacb20ca9d65dfd1592497a59948829197df6753ac646ed68484fdd57f9ba29daa0edcd0d63f26db00c0d89abd637da2cda1e28675b1ce45af44f2252a7308908895fa781df15c07b9fb344ebe5004cf8cc5c9e", 0x56}], 0x1, &(0x7f0000001bc0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="00000000280000edffffff09010000080100000049e1c628b86030b74e12e907a5de25df24a8ff3e14901c0a", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB='\x00\x00\x00\x00'], 0x130, 0x800}], 0x3, 0x0) getpeername$unix(r2, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x2, &(0x7f0000000280)=""/249, 0xf9) 10:55:27 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6dd}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2028.080329][ T5226] FAULT_INJECTION: forcing a failure. [ 2028.080329][ T5226] name failslab, interval 1, probability 0, space 0, times 0 10:55:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(r0, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)=0xfe1e) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000240)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) pipe2$9p(0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60000020}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="01012bbd7000ffdbdf25030000003c00f6a87cfcae9143b48c1f5b9bc1662c17016d19400300140006003b39ca14099821000600000000000000000000000000000000010800040000000000080007004e240000080004000800000009000300140002006e6c6d6f6e300000000000000000000008000600030700002c0001000800020073000000080001000a000000714a050000000000080002003b000000080002003e000000080006000000000008000400a5bf14652b8650431db27c0240175f61e5abd0ee348c9eb85c7827972cde"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) unshare(0x40000000) [ 2028.120680][ T5226] CPU: 1 PID: 5226 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2028.128633][ T5226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2028.138793][ T5226] Call Trace: [ 2028.142117][ T5226] dump_stack+0x172/0x1f0 [ 2028.146475][ T5226] should_fail.cold+0xa/0x15 [ 2028.151108][ T5226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2028.156952][ T5226] ? ___might_sleep+0x163/0x280 [ 2028.161815][ T5226] __should_failslab+0x121/0x190 [ 2028.166807][ T5226] should_failslab+0x9/0x14 [ 2028.171324][ T5226] kmem_cache_alloc_node_trace+0x270/0x720 [ 2028.177180][ T5226] __kmalloc_node+0x3d/0x70 [ 2028.181718][ T5226] kvmalloc_node+0xbd/0x100 [ 2028.186221][ T5226] alloc_netdev_mqs+0x821/0xd30 [ 2028.191089][ T5226] __tun_chr_ioctl+0x178d/0x3ee0 [ 2028.196061][ T5226] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2028.201697][ T5226] ? tun_select_queue+0x7d0/0x7d0 [ 2028.206735][ T5226] ? retint_kernel+0x2d/0x2d [ 2028.211335][ T5226] ? tun_chr_compat_ioctl+0x30/0x30 [ 2028.216547][ T5226] tun_chr_ioctl+0x2b/0x40 [ 2028.220977][ T5226] do_vfs_ioctl+0xd6e/0x1390 [ 2028.225566][ T5226] ? ioctl_preallocate+0x210/0x210 [ 2028.230681][ T5226] ? __fget+0x381/0x550 [ 2028.234838][ T5226] ? ksys_dup3+0x3e0/0x3e0 [ 2028.239248][ T5226] ? check_memory_region+0x112/0x190 [ 2028.244548][ T5226] ? tomoyo_file_ioctl+0x23/0x30 [ 2028.249507][ T5226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2028.255749][ T5226] ? security_file_ioctl+0x93/0xc0 [ 2028.260909][ T5226] ksys_ioctl+0xab/0xd0 [ 2028.265092][ T5226] __x64_sys_ioctl+0x73/0xb0 [ 2028.269730][ T5226] do_syscall_64+0x103/0x610 [ 2028.274348][ T5226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.280259][ T5226] RIP: 0033:0x458d99 [ 2028.284154][ T5226] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2028.303775][ T5226] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2028.312222][ T5226] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 10:55:27 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6de}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:27 executing program 4: r0 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000a83000)={0x0, {{0xa, 0x4e23, 0x0, @mcast1, 0xffffffffffffffff}}, {{0xa, 0x0, 0x0, @loopback, 0x8}}}, 0x108) [ 2028.320190][ T5226] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2028.328351][ T5226] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2028.336322][ T5226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2028.344311][ T5226] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:27 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6df}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2028.708822][ T5248] IPVS: ftp: loaded support on port[0] = 21 10:55:28 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfeffffff00000000, @ipv4={[], [], @dev}}, 0x1c) 10:55:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) chdir(0x0) symlink(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x100) link(0x0, 0x0) lseek(0xffffffffffffffff, 0x1, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) io_setup(0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180), 0x8) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r3 = dup(r1) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000440)) sendto$inet6(r1, 0x0, 0x0, 0x20000005, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0xfffffffffffffeb8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000080)) r4 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x60) ftruncate(r4, 0x7fff) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendfile(r3, r4, 0x0, 0x8000dffffffe) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) 10:55:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fallocate(r1, 0x8, 0x9acc, 0x100000000) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000080)=@sco, 0x80, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/168, 0xa8}, {&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f0000000140)}], 0x4, &(0x7f0000000400)=""/42, 0x2a}, 0x20) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x10400, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000001480)={0x0, 0x1000, &(0x7f0000000480)="8c41ceeca9a75bfcc837dc541ff5906c00f6234a8cab3257aa2d7e82bc7f33f1eb2450321661f14ba84007e255b1ff61d65cdcfcba2b6647dc8c0382b5c01a7afda92ea68d8bdabcc7492ed2054f374cea02211bc223b6d46a6dda8dac10ff99ef587e74add219bc0b0557d07e55d5c97fe8708a37ce55511c46509ded0c5714d2baa67738cf06b6246a86052637f689dd5afea454222f70e54a11d12cbf8efe7408c7e35c8fdabb646feeb1f9e33f5727d18cb938c87abdd0922b43ed9a8dbee6444eade3e0407219f3723078b573a6b005bc9141d44ace1e05e4933c469df24b87c2fa4b04b9846e3d8668e936964f04fe250a307f11df850dcc6ac6d17011978efef00747717fe75b3f0606c4437790ddfe319b15b4d6a80b64dfd450ae0457a84db10ad706f1908bc68a4833e327fd87af0c3afbdf9e2070bca0c3bc37beab41bafc9983d0498bc62e3430ebdbed6fa09416c9c8bce6e5796ed4372412d0fb4680e3719732b14ecc80a8c242ef48c9c475daeb0cbe5f2df2f7c1a1a946e91f0dc460eb9ef88ca78072293036c9ef556693a6b45e3a75cd0168fd863baf36a5a2c3df6b7cda8fa09c9923ba33646d23532d70e39aa36bd86fa6551e7b134a70b84e3234eaf7f3ff098dc9ebf55fbeba87444387bfe68291c2fcc5cd0d43ab52ac2954b8275aed5f0f1ce2a69b0761ce4ae205dd390c8a82eb38c1dea40bfea28c06c15eb8337d065b7a40e83c58b62ef36482d1b36e01883e25dc666253704038135c7920dc6b730d0cdd1d4e7be169a8106e0b9a9db4c04f864052eac244510f01ab63326d9d2100fee1e8eeb5dc6481426af9de9a55a7d1745ff8be31672f3d8d3dbe25c5851ec2ce8dc9c79113c61e910d8fa4eedcdfcc4e3c27f534da6c19f78c3bdd5767a034d44c72a00b1d45fc097e8b51e5d518ab0227ea4bb1c798830c21328e1a01befbd36e4dbd889a38c6bd8603215145fd7b2a4534b9cc53c6a2c8da42fc57af712f3f24abf4449333e1438501893b133950a77ad64309317860ff7c128e760bec18c722fcc397210651517d77e897403770e148a135997b69962d3e95b8f570f9709c31a41dfb32d02f453f8ad975030f319f67da76fb3efa7da04762112687f5fa6f9e91da090375fcca5430c4effa7157a04823ba41c6682ca35b73c51e0cf247b76f76e839c642771a322b7412f2aaee6bc4b358004c6a63724ab26b5e82b1e7d87b243b36c1452d6f285372fb6d9082a1a2de78cbe9bb13d09be495967e68a55797700b1d31611c2631881a7b78d75dd59709aa5fb65ffff8a3025b9a719b47e03213c53820672d9ad5eaef75ff7b2dcf0b925f8d83e1b9aa2f1d36d29f127d23ec88230295183b7cb4e6005c84a168f0e1cef1dd64a0f8412e23f915e394ac79d8b19f335e970c07b3da4c03440c54154e5eacfa3cc3c931bcfa517838dcd0949b7b05a2bccf970611d93923cedfa0c6bbacb8686ceb1e61792982cc750c9dfb8b5d3934b5c63fc028074993b84af1bf3cabd5865bb09e51837c8ab14e0a8d3a46e32a1c10104b3181957f4fa0f82a08961381e7dc52493878ea5ef2184e242e53010b0f2f3fcee643fe206de7c0d7c33fdd77ac76fa5889e9482fde6f7a9c60bff15a593592cb82dc36824956ceeee5a981324f6e4163c78a64f5b79d79d53ebe86be86c338a26af2819cb142420fa6d8f1442c685ef46b58fbaf7593c149bb99d3247254a272c639d30c13b16c60ba4ae2bcfd6faf0fc8b7913e67fdb875b56381d90e2360aa77cd8009ce2d8f97d363236267cce2a32d3a42f44ec23fe0c2620ce6473202814f34dd4b9775b30616c8554859695e9871490e30e895fd1fc571aff14b9b4e2ea36203659606c5b418d1ce676bad16c6bbd2b67d547fd11214bc0043f68cac011cc86b14cbe8beebd6db7c7ca685a73e89c7398bef4811945cadb40fb4b70b9888c3516061024aed8c09c9fc4a09ace016495425a762e13075551ae77a2272c5adb9ad372a50c71ae5837a3320c2613527f5a1548f3c9d865e5c92bbf891e55b95f3fe76e7628be499f216860af127aaed1c5de01e63291b8aca1428067295ce1cbecbf61c061663ec9a129f0e2d67720eabcf698b7b56c4f82a55ffee5f8bd64150d20db73e5a8e0dbe0ee0906e23584d79281a7a6a746fcae6285c83cef97c791729b7f4c9ef0fec55c2996928ecacb06d6aafeba9f2d7f39eeb58de72a4db4c584a6bb489fdee0093638d56ec948f5cc75c18492ab23f8cc97102c603ba1d7a961fbac161d4e6607269fb7fba56debd161ae34da8b9538752e11f39761dae5063005d59cfe9d75008661d7c9fd56d12b2451ed56e9f4579ea42feb110486c081d92e7ddf254a16c212aa0422bc0c44829445e8635de0161c8ae9644310e93b7bd75f0f58766a61d72de79984bda1ed48051f18f3587ba389bfd25b54ac00deeeb3ccac7de3aec5a6842c09e00ca1eb765eea96697a27723def46cd5a0f9ea4f442e18c0596a3b6d7a5da56e30c35360a5458aaa3014994c947d94a4c9108d4bcf15da5dbd791b47bc2b55c4e2c365d574c79f4bb613aba9c07a34ee0c9ab2e683797d61580aad22d55be9c78e816c93dd97b1686dffb252816d71b1b6960b5ddcd02a46d8c286a2b02cd8cea8a7e758bc8b6d7c014196496c58b02d823ba5129a62b15901aecf1bdd9b3b88980e8ef75e93e8f257eeaf4800fab1b9cace79d01518db249b22b7174851aeacc7d7043fbf9be667ae04695e6d64202def2cdd8cb43e10474420b4dddd45551ceb70975af0486539071cc254d2829230a4e463e225e0b2f3d92313c30297482f612bd6574210e42ca90fb041744fbde211c577d8649d19fa2db288fb9d11152e36d621e0f099bd545ee0c898ff365636548b58465f1c2dec3515ae8b631b8885cb73fdaaa8b0343d86d804e65ce431c759b0df24a06be4a5621a0045bb608862557fa85eb5ed04f9b71c02d778d54a485365c3bc65eb4ef0c3fc0c716062fddfd40fe48485f74a94bb478c6dcb0cafa7c82520ff82747f376c112eec0b06c2d8192feb137d4a4d5a4bd8a26e073579ad2c735ae741c94871f045ef42ab8d509e4d5a2a402c2e6106d7dbaf81884a17b166e5519a5e795d473b9564dbc868e4da83cde9f4a6978bb80098a806bffc7fcb3999c0fa5a4ea23422de6dcbbaefff320612f6162744b621921e9cfe0501495978ce33f4e92aeed6814b7cd16b1592e8a3d50da11dc3234ed82e1351aa3456463cca8dde55e08f45bb04fd3b7679cfa111735fd99750ab6373ef4d498989d0d245d962e8e77377137873326d281c823192786745124ad27b48d93dde392735285b40ceed8cceae5e63f3897d341d437a0ca7c56802f0957f045c48a0eef507c6f0625ab49a5f54070ed78f489820d0916a2dfb95c621c0354a17baee6640f4ce73cc156f8dfbaba564f9fa77caf1fd082f9906387ef331b570a39871af1d3f073558b70711577539c85e7d5fad6119c0584d3e0d26ccf55f89d2dfd1347896661629e0845657f08c67d0b485a1fa8517dac8911e8e4341f923d1276dc66ba8ca007fe20c2e036952434935e44fb3ad11307c0df290d0919ddaeaa9e9358c4282148062c1df2d0b686f8c0bf196ff5141b6d4247e27ba1996617e58cfbd08a97386745585b94a43848787b350e0d2b832fd1c31a4f9cba0212228b4a7bde5ff94f70951cce22c44ff2ed0d5dbf04e566bff7c20be8749230c3e2c8b89b38a53970564ee248430dccb94b2e8acbb767ad23aed0c0364ce9ddbe013bdeb2cc9e82a4249529b01abc623504a5c754eeea24a4e1c2aca5d92f563c267d0724c143a516df2566c23cde3f4b17d14f8d3adfd131719dd3dff5cec308155cb496c5d08e2e5794dc082a5036170b8beead7f751b096013c5ecfa4b23c64093fbbbb1ba8b18a35afd3e7d6b4313f1214d3fb170af5242bc00e3b9009412df3cbbe2f676513f681176c6ced18cc323fc672521967c550fe7508596ae50c001793cbee15cb8adb77cf7fccc9ef3c75ce4912bebc3baf857d8b7dc96f6bd5a22386b851292b310131111acee8a2216c9ef920bd50cea26a05ab6f8f067a1d2e42217f10469593368c5b769f168ede103c670203822c650b653e85742f9350bbe2fb72358c49c0ac9cd6f476dce1154e1380e608affb7aa3a98f64e6d4270ffc8d29969d8317fe8a1c09b7980bf058574be4058f908f46f8335b595db94ce851fa1e02edda73ee7672cd779d5464fa08119e646a3def7210e00f14e142db4e792aa6242bccc6c47dab71ca5a7b4a16365f8109acb924d74b916d2ec6198c25d4d783c4f13a1e3f4edc33d265b0c9d29fab53781f4827bd61348f3d38614ca29e1111fbeae9807def3183cb604af64cdcb49d34c5732da6536d955ec20dc3120e9c3c0f7e67863b2f6789ba8033c1af1fd808d56cfe3a5bae0e24a1eb5f857d0b16882eadffd3e223ccc68a9d9a6ee9a93a34b87e61884c685a0a8230b9acf05c690c240bacf6b2d960eaf7d0b8b31ad86e32dc44eebf46dddd40d0bf17fd033d03bb3ecc0743f284f57572912bd355dfd16919e5f3ef167babda9000bc172f84e3d59890e32895abe657df893984e09b3aa6da7968adaedb837632453a2f440ec5fdca2e526731bc627c11bfa8652b99d5a0f513ce1614e1a876ce5c4fde0c7d06d2ce1ee60b91caa2fe91fcaa0e3da3e9d05772ef4d36592b1a332e51e14b286bf4bfd6272a0c36aef511e33cc3bd5a5cfce8f23b9a177f2c90527012875b561b7059506d25b8db03407d34773f032523703727895cab66f076c54a8a74eea3ea97373cd11131ddc57a908e032cb7bcd288db4814c524e198d520f583a66e003d0522ce4aec63c337d9d64c20f521bfa67ccbe1465c7b3065ddb4663c8e563e5e2783056f1fc078eef80fb8613869a23624788e9aaaaef72f6405780b480197015179607a8625a2d7217aa78f9a286bece5d81abd4833fae96ccc0f1c8a40c296acdb67c2295a4ab177ec0e27507e578fab057a2acd0bdb4bc763e5e6b762b9c26c3d792acda130eb5f0fd94ca73558620c625ead2d04c425fb5b4a48925f38c1ecbd32e5ddc4a827a2b787924ce95cc6cf5efcc59a3bed46c3d654bf8a3ce8018128b5b90017c3f0f6eacdba29bdbbd7251d127445714949320797c09c14dba9e7617145c8ab8799c2db75145d1399f663b680638e72666c03b3f2dba5cbc9cdcd73c4c992b4556464356becd083239e71ca96fbf03fd158959ce4103304befbb6fb3267818ce3b91f5ee728ebae2f4634938240cbcdcf9c8fe36f3ede44802a65d177627cce7abeba029fe6f5f23ccbbacfdae8c6ee80ad5a52335480f7927810f085106f2294e5e03d85c33762aef573f0ca260906388b8237040b2b8d8112cd770dbe1d520050bd588eb83c973422dc51306940484c0b7b60cbf17c2c182efa9c458742d8ea1c048495cf292e9ade9c6525e094b8471e59e8f2b7d75aaf5a91feb164f7569d6a57837fbaeb231288f694f6cbcde1c039bf5239abc7a7c48da544041d050f1348da2eb1a5fe40fdab015a50bf7c21d6a1ccf12d575f857e8eb63adeab70c5215b7ee7efb5990027c6b6c0af5fe111e1e5b6d548f247269f93f7c138bcb4cb4211d6ca13231458272e32dd848f12e87c597f69e85b178f98c67e70659372a8934a2d1ee79bf69b160905aee63d865e664fdfaf854655f62f41ee8919c64c89265a84a77229753f9d0e43f136e28ca087"}) fcntl$setflags(r1, 0x2, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 10:55:28 executing program 5 (fault-call:7 fault-nth:4): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:28 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2028.846800][ T5268] IPVS: ftp: loaded support on port[0] = 21 [ 2028.968268][ T5275] FAULT_INJECTION: forcing a failure. [ 2028.968268][ T5275] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.986228][ T5275] CPU: 0 PID: 5275 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2028.994169][ T5275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2029.004259][ T5275] Call Trace: [ 2029.007578][ T5275] dump_stack+0x172/0x1f0 [ 2029.011942][ T5275] should_fail.cold+0xa/0x15 [ 2029.016569][ T5275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2029.022398][ T5275] ? ___might_sleep+0x163/0x280 [ 2029.027302][ T5275] __should_failslab+0x121/0x190 [ 2029.032259][ T5275] should_failslab+0x9/0x14 [ 2029.036781][ T5275] kmem_cache_alloc_node_trace+0x270/0x720 [ 2029.042626][ T5275] ? retint_kernel+0x2d/0x2d [ 2029.047246][ T5275] __kmalloc_node+0x3d/0x70 [ 2029.051764][ T5275] kvmalloc_node+0xbd/0x100 [ 2029.056284][ T5275] tun_attach+0x754/0x1440 [ 2029.060809][ T5275] ? mod_timer+0x576/0x1030 [ 2029.065356][ T5275] __tun_chr_ioctl+0x2180/0x3ee0 [ 2029.070311][ T5275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2029.075834][ T5275] ? tun_select_queue+0x7d0/0x7d0 [ 2029.080881][ T5275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2029.086383][ T5275] ? tun_chr_compat_ioctl+0x30/0x30 [ 2029.091608][ T5275] ? tun_chr_compat_ioctl+0x30/0x30 [ 2029.096866][ T5275] tun_chr_ioctl+0x2b/0x40 [ 2029.112246][ T5275] do_vfs_ioctl+0xd6e/0x1390 [ 2029.116870][ T5275] ? ioctl_preallocate+0x210/0x210 [ 2029.122009][ T5275] ? __fget+0x381/0x550 [ 2029.126193][ T5275] ? ksys_dup3+0x3e0/0x3e0 [ 2029.130642][ T5275] ? tomoyo_file_ioctl+0x23/0x30 [ 2029.135602][ T5275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2029.141872][ T5275] ? security_file_ioctl+0x93/0xc0 [ 2029.147014][ T5275] ksys_ioctl+0xab/0xd0 [ 2029.151196][ T5275] __x64_sys_ioctl+0x73/0xb0 [ 2029.155830][ T5275] do_syscall_64+0x103/0x610 [ 2029.160448][ T5275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2029.166355][ T5275] RIP: 0033:0x458d99 [ 2029.170270][ T5275] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2029.189899][ T5275] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2029.199526][ T5275] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2029.207512][ T5275] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2029.215502][ T5275] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2029.223487][ T5275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2029.231485][ T5275] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:28 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:29 executing program 1: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) unshare(0x400) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000240)={0x18}, 0x18) fcntl$setflags(r0, 0x2, 0x1) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r1) r3 = open(&(0x7f0000000040)='./bus\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="340000005cb9625e0100065e060f6a825759414427169a38d366a0dffce8f972bafe0f3be5be09ce53d29649232ac832d71ae62a3cdcc6a4"], &(0x7f00000001c0)=0x3c) tee(r2, r3, 0x18, 0x0) 10:55:29 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2030.132338][ C1] net_ratelimit: 25 callbacks suppressed [ 2030.132346][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2030.142375][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2030.144758][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2030.150587][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2030.156366][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2030.167851][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2030.173817][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2030.179600][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2030.372294][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2030.378258][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:55:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0x0, {0x3}}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz0\x00', {}, 0x0, [], [], [0x3]}, 0x45c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x50000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000080) ioctl$UI_DEV_CREATE(r1, 0x5501) write$uinput_user_dev(r1, &(0x7f0000000200)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x45c) 10:55:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca008ddc1e8751c5000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00", 0x48}], 0x1) setuid(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x58100, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffff55, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000240)=0x5) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={0x0, 0x0}, 0x20) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x244) request_key(0x0, 0x0, &(0x7f0000000180)='\'\x00', 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000280)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000380)={r4}) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x240800, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) read(r0, 0x0, 0x0) accept(r0, &(0x7f00000000c0)=@rc, &(0x7f0000000140)=0x80) 10:55:31 executing program 5 (fault-call:7 fault-nth:5): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:31 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffd15) 10:55:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xff00000000000000, @ipv4={[], [], @dev}}, 0x1c) [ 2031.953167][ T5313] input: syz0 as /devices/virtual/input/input67 [ 2032.006056][ T5311] FAULT_INJECTION: forcing a failure. [ 2032.006056][ T5311] name failslab, interval 1, probability 0, space 0, times 0 [ 2032.006165][ T5311] CPU: 0 PID: 5311 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2032.028219][ T5311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2032.038285][ T5311] Call Trace: [ 2032.038314][ T5311] dump_stack+0x172/0x1f0 [ 2032.038335][ T5311] should_fail.cold+0xa/0x15 [ 2032.038354][ T5311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2032.038374][ T5311] ? ___might_sleep+0x163/0x280 [ 2032.038393][ T5311] __should_failslab+0x121/0x190 [ 2032.038407][ T5311] should_failslab+0x9/0x14 [ 2032.038423][ T5311] __kmalloc_track_caller+0x2d8/0x740 [ 2032.038439][ T5311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2032.038455][ T5311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2032.038477][ T5311] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2032.056488][ T5311] ? kstrdup_const+0x66/0x80 [ 2032.096906][ T5311] kstrdup+0x3a/0x70 [ 2032.096936][ T5311] kstrdup_const+0x66/0x80 [ 2032.096953][ T5311] kvasprintf_const+0x10e/0x190 [ 2032.096972][ T5311] kobject_set_name_vargs+0x5b/0x150 [ 2032.097084][ T5311] dev_set_name+0xbd/0xf0 [ 2032.119743][ T5311] ? device_initialize+0x440/0x440 [ 2032.124941][ T5311] ? __init_waitqueue_head+0x36/0x90 [ 2032.130295][ T5311] ? pm_runtime_init+0x311/0x3b0 [ 2032.135300][ T5311] netdev_register_kobject+0xc3/0x3b0 [ 2032.140701][ T5311] register_netdevice+0x878/0xff0 [ 2032.145746][ T5311] ? netdev_change_features+0xb0/0xb0 [ 2032.151156][ T5311] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2032.156134][ T5311] ? tomoyo_init_request_info+0x105/0x1d0 [ 2032.161882][ T5311] ? tun_select_queue+0x7d0/0x7d0 [ 2032.166943][ T5311] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2032.172764][ T5311] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2032.178083][ T5311] ? retint_kernel+0x2d/0x2d [ 2032.182692][ T5311] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2032.188343][ T5311] ? __fget+0x35a/0x550 [ 2032.192514][ T5311] ? tun_chr_compat_ioctl+0x30/0x30 [ 2032.197725][ T5311] tun_chr_ioctl+0x2b/0x40 [ 2032.197746][ T5311] do_vfs_ioctl+0xd6e/0x1390 10:55:31 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=ANY=[@ANYBLOB="4000000010001fff000000008a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140009000a000100aaaaaaaaaa00"/40], 0x40}}, 0x0) 10:55:31 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2032.197768][ T5311] ? ioctl_preallocate+0x210/0x210 [ 2032.197784][ T5311] ? __fget+0x381/0x550 [ 2032.197807][ T5311] ? ksys_dup3+0x3e0/0x3e0 [ 2032.211924][ T5311] ? tomoyo_file_ioctl+0x23/0x30 [ 2032.211945][ T5311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2032.211963][ T5311] ? security_file_ioctl+0x93/0xc0 [ 2032.211989][ T5311] ksys_ioctl+0xab/0xd0 [ 2032.240964][ T5311] __x64_sys_ioctl+0x73/0xb0 [ 2032.245576][ T5311] do_syscall_64+0x103/0x610 [ 2032.250187][ T5311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2032.256086][ T5311] RIP: 0033:0x458d99 [ 2032.256109][ T5311] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2032.256119][ T5311] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2032.256134][ T5311] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2032.256144][ T5311] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2032.256152][ T5311] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2032.256161][ T5311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2032.256177][ T5311] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0xfffffffffffffffd, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) 10:55:31 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:32 executing program 0: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000140), 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x40c00, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000001c0)={0x27, 0x3, 0x0, {0x2, 0x6, 0x0, 'vcan0\x00'}}, 0x27) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = dup2(0xffffffffffffff9c, r1) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), 0x4) clock_gettime(0x7, &(0x7f0000000240)) ioctl$RTC_WIE_OFF(r0, 0x7010) mq_timedsend(r2, &(0x7f0000000080)="267ccaafd7dc34db02144b9eddadcc398904ffc31752d884017c207a3a91a3d0231f18c1126e9a01a34a4e90d80fa5c2b19df36b4257f4f7a2e77cd8c4591d8fc89cc27449186dd4d0fb3508e5dad609a158fb047ef1186e5c0900f62d42588b44897ed2ca7267fa10da773c9fdeb09701d1dbf26092c3726226b618727f0ebed82de01594d196c980ff1fba62d92e1e7219b4b5909fc9f70f2e483b7459671e9078300e9bdd0cef6c7b1d5ff800bb51", 0xb0, 0x180, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@remote, 0x1e, r3}) 10:55:32 executing program 4: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000)={0x14, 0x0, 0x1, 0x25}, 0x25) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0xffffffffffffff00, 0x6, 0x20c, 0x5, 0x4, 0x2, 0x100000000, 0x3, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x7ff}, &(0x7f0000000140)=0x8) 10:55:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100)="a9", 0x1, 0xc5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/190, 0xbe}], 0x1}, 0x1) 10:55:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008914, &(0x7f0000000080)="1fdc1e123c123f319bd070") ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bond0\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4b}}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000040)={0xaf, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x3, 'rr\x00', 0x15, 0x6, 0x33}, 0x2c) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x80, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000200)={@initdev}, &(0x7f0000000240)=0x14) 10:55:32 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0xd29e19611b2c60f4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={r1, r2, r3}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r5 = accept4(r0, 0x0, 0x0, 0x7ffff) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000200)="ad00c2", 0x3) sendmmsg$unix(r5, &(0x7f0000000680), 0x4924924924925c6, 0x0) 10:55:32 executing program 5 (fault-call:7 fault-nth:6): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:32 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xffffffff00000000, @ipv4={[], [], @dev}}, 0x1c) [ 2033.462611][ T5356] IPVS: set_ctl: invalid protocol: 175 172.30.0.5:20004 [ 2033.482792][ T5357] FAULT_INJECTION: forcing a failure. [ 2033.482792][ T5357] name failslab, interval 1, probability 0, space 0, times 0 [ 2033.503410][ T5357] CPU: 0 PID: 5357 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2033.511334][ T5357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2033.521421][ T5357] Call Trace: [ 2033.521456][ T5357] dump_stack+0x172/0x1f0 [ 2033.521482][ T5357] should_fail.cold+0xa/0x15 [ 2033.521503][ T5357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2033.521526][ T5357] ? ___might_sleep+0x163/0x280 [ 2033.521550][ T5357] __should_failslab+0x121/0x190 [ 2033.521568][ T5357] should_failslab+0x9/0x14 [ 2033.521587][ T5357] kmem_cache_alloc_trace+0x2d1/0x760 [ 2033.521613][ T5357] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2033.521629][ T5357] ? refcount_inc_checked+0x2b/0x70 [ 2033.521655][ T5357] device_add+0xfdc/0x18a0 [ 2033.521680][ T5357] ? device_initialize+0x440/0x440 [ 2033.580326][ T5357] ? get_device_parent.isra.0+0x570/0x570 [ 2033.586061][ T5357] ? __init_waitqueue_head+0x36/0x90 [ 2033.591363][ T5357] ? pm_runtime_init+0x311/0x3b0 [ 2033.596328][ T5357] netdev_register_kobject+0x183/0x3b0 [ 2033.601869][ T5357] ? notifier_call_chain+0x1e5/0x240 [ 2033.607189][ T5357] register_netdevice+0x878/0xff0 10:55:33 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) lsetxattr$trusted_overlay_origin(&(0x7f0000000440)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1, &(0x7f0000000340)="0adc1f127a8bac27ad1e3c123f319bd070") mq_open(&(0x7f0000000080)='trusted.overlay.origin\x00', 0x80, 0x81, &(0x7f00000003c0)={0x5377, 0x7, 0xffff, 0x7, 0x81, 0x1, 0x6, 0xaf2}) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) connect(r0, &(0x7f0000000480)=@x25={0x9, @remote={[], 0x2}}, 0x80) select(0x40, &(0x7f0000000180)={0x2, 0x90, 0x1, 0x6, 0x0, 0x1, 0x6, 0x4}, &(0x7f00000001c0)={0x8001, 0x2, 0x9, 0x10000, 0x7fff, 0x0, 0xfffffffffffffff9, 0xfff}, &(0x7f0000000200)={0x8, 0x3f, 0x1, 0xbdd, 0x7fffffff, 0x9, 0x7, 0xcb0}, &(0x7f0000000240)={0x77359400}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000280)=0x5) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 10:55:33 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x8, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = gettid() clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_writev(r1, &(0x7f0000001500)=[{&(0x7f0000000100)=""/189, 0xbd}], 0x1, &(0x7f0000000040)=[{&(0x7f0000001580)=""/147, 0x93}], 0x1, 0x0) ptrace(0x4208, r1) 10:55:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e8}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2033.612236][ T5357] ? netdev_change_features+0xb0/0xb0 [ 2033.617626][ T5357] ? __tun_chr_ioctl+0x218d/0x3ee0 [ 2033.622758][ T5357] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2033.627712][ T5357] ? tomoyo_init_request_info+0x105/0x1d0 [ 2033.633460][ T5357] ? tun_select_queue+0x7d0/0x7d0 [ 2033.638502][ T5357] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2033.644323][ T5357] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2033.649623][ T5357] ? retint_kernel+0x2d/0x2d [ 2033.654239][ T5357] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2033.659904][ T5357] ? __fget+0x35a/0x550 [ 2033.664094][ T5357] ? tun_chr_compat_ioctl+0x30/0x30 [ 2033.669319][ T5357] tun_chr_ioctl+0x2b/0x40 [ 2033.669339][ T5357] do_vfs_ioctl+0xd6e/0x1390 [ 2033.669360][ T5357] ? ioctl_preallocate+0x210/0x210 [ 2033.669383][ T5357] ? __fget+0x381/0x550 [ 2033.687641][ T5357] ? ksys_dup3+0x3e0/0x3e0 [ 2033.687658][ T5357] ? ksys_write+0x1ec/0x2d0 [ 2033.687680][ T5357] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 2033.702150][ T5357] ? tomoyo_file_ioctl+0x23/0x30 [ 2033.707112][ T5357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2033.713372][ T5357] ? security_file_ioctl+0x93/0xc0 [ 2033.713393][ T5357] ksys_ioctl+0xab/0xd0 [ 2033.713411][ T5357] __x64_sys_ioctl+0x73/0xb0 [ 2033.713429][ T5357] do_syscall_64+0x103/0x610 [ 2033.713448][ T5357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2033.713460][ T5357] RIP: 0033:0x458d99 [ 2033.713474][ T5357] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:55:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6e9}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2033.713482][ T5357] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2033.713497][ T5357] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2033.713505][ T5357] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2033.713513][ T5357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2033.713522][ T5357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2033.713538][ T5357] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x4, 0x100) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000440)={0x3, &(0x7f0000000140)=""/97, &(0x7f00000003c0)=[{0x0, 0x83, 0x3, &(0x7f00000001c0)=""/131}, {0x4, 0x3d, 0x3, &(0x7f0000000280)=""/61}, {0xa895, 0xa3, 0x0, &(0x7f0000000300)=""/163}]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fdinfo\x00') mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 10:55:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000240)="815e020080000065410f058fc820a6380dc4617be61d07000000c462d9bf62f266baa10066b8990066ef26650f01cb8fe9509a965ace4cc366bad00466b8000066ef8f0918953d04000000"}], 0x155556f2, 0x0, 0x0, 0x8a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x28) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2002, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000100)=""/236) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x102, 0x100000000000001}, 0x20) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000400)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x21) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r5 = socket$inet6(0xa, 0x6, 0x0) r6 = dup2(r5, r0) setsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x5, 0x2) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x84400, 0x0) ioctl$IMGETCOUNT(r7, 0x80044943, &(0x7f0000000080)) 10:55:33 executing program 5 (fault-call:7 fault-nth:7): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:33 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ea}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:33 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000100)={@empty, @empty, [], {@mpls_mc={0x8848, {[{0x65f, 0x7fff, 0x2, 0x5}, {0x3, 0x7, 0x4, 0x64}, {0x1, 0x9, 0x5, 0x8fa5}, {0x0, 0x4, 0x12426e5b, 0x3e}, {0x401, 0x101, 0x2, 0x3f}], @ipv4={{0x0, 0x4, 0x100000000, 0x6, 0x0, 0x66, 0x1, 0x53, 0x6, 0x0, @rand_addr=0x2, @dev={0xac, 0x14, 0x14, 0x21}, {[@noop, @cipso={0x86, 0x0, 0x5, [{0x2, 0x0, "0e"}, {0x7, 0x0, "163c2cef37"}, {0x7, 0x0, "148f37"}, {0x5, 0x0, "92fc303fede67a2dbd9598c26f37"}, {0x2, 0x0, "c3bb0065f21154da3f07212b00ce"}, {0x7, 0x0, "3bc29605eae1fe6b9d"}, {0x0, 0x0, "c750d6"}, {0x7, 0x0, "e39b44126279438efe88617dd8d70f"}, {0x2, 0x0, "23c4e0903e5874423a"}, {0x0, 0x0, "25c9d0d0b810a006cddf00bdd3"}]}, @cipso={0x86, 0x0, 0x401, [{0x1, 0x0, "d8242e5378"}, {0x6, 0x0, "d8506350e6e13e917595"}, {0x7, 0x0, "1e55cca633c1"}, {0x7, 0x0, "cd751de3b2bceff7edd1a4f19478b7"}, {0x7, 0x0, "a7d53be4e3fa"}, {0x1, 0x0, '/'}, {0x7, 0x0, "075aebe1af10"}, {0x2, 0x0, '\a.'}, {0x2, 0x0, "f3b703cb1e877558c3666dd7db"}]}, @ra={0x94, 0x0, 0x8001}, @ra={0x94, 0x0, 0xfff}, @cipso={0x86, 0x0, 0x401, [{0x7, 0x0, "f4484f44"}, {0x1, 0x0, "3b78b78ee8e4807cbe3a7d5fea"}, {0x7, 0x0, "22a7f0a96006e327598b3a6a"}, {0x7, 0x0, "539c508cbeb70f6b09a4d665845781"}, {0x7, 0x0, "481ce0699d4946a0cde598996f"}, {0x6, 0x0, "1a"}]}, @noop, @cipso={0x86, 0x0, 0x8, [{0x7}]}, @end]}}, @tipc=@payload_direct={{{{0x0, 0x0, 0x326, 0x9, 0x8, 0x0, 0x3, 0x2, 0xfc00000000000000, 0x0, 0x0, 0x8000, 0x7, 0x3, 0x73, 0x100000000, 0x3, 0x4e20, 0x4e21}, 0x4}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0xe40f) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) [ 2034.141748][ T5403] FAULT_INJECTION: forcing a failure. [ 2034.141748][ T5403] name failslab, interval 1, probability 0, space 0, times 0 10:55:33 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x2, 0x0, 0x0) dup(r0) [ 2034.213691][ T5403] CPU: 1 PID: 5403 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2034.221631][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.231708][ T5403] Call Trace: [ 2034.235029][ T5403] dump_stack+0x172/0x1f0 [ 2034.239386][ T5403] should_fail.cold+0xa/0x15 [ 2034.244658][ T5403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2034.250586][ T5403] ? ___might_sleep+0x163/0x280 [ 2034.255465][ T5403] __should_failslab+0x121/0x190 [ 2034.255484][ T5403] should_failslab+0x9/0x14 [ 2034.255502][ T5403] __kmalloc_track_caller+0x2d8/0x740 [ 2034.255522][ T5403] ? mark_held_locks+0xa4/0xf0 [ 2034.255535][ T5403] ? kstrdup_const+0x66/0x80 [ 2034.255558][ T5403] kstrdup+0x3a/0x70 [ 2034.265012][ T5403] kstrdup_const+0x66/0x80 [ 2034.265099][ T5403] __kernfs_new_node+0xb0/0x690 [ 2034.265123][ T5403] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2034.265147][ T5403] ? retint_kernel+0x2d/0x2d [ 2034.265175][ T5403] kernfs_new_node+0x99/0x130 [ 2034.307714][ T5403] kernfs_create_dir_ns+0x52/0x160 [ 2034.312850][ T5403] sysfs_create_dir_ns+0x131/0x2a0 [ 2034.317981][ T5403] ? sysfs_create_mount_point+0xa0/0xa0 [ 2034.323549][ T5403] ? net_namespace+0xd/0x40 [ 2034.328068][ T5403] ? device_namespace+0x9d/0xd0 [ 2034.332953][ T5403] kobject_add_internal.cold+0xe5/0x5d4 [ 2034.338523][ T5403] kobject_add+0x150/0x1c0 [ 2034.342967][ T5403] ? kset_create_and_add+0x1a0/0x1a0 [ 2034.348278][ T5403] ? device_add+0x32f/0x18a0 [ 2034.348303][ T5403] device_add+0x3d5/0x18a0 [ 2034.348321][ T5403] ? device_initialize+0x440/0x440 [ 2034.348346][ T5403] ? get_device_parent.isra.0+0x570/0x570 [ 2034.362453][ T5403] ? __init_waitqueue_head+0x36/0x90 [ 2034.362473][ T5403] ? pm_runtime_init+0x311/0x3b0 [ 2034.362499][ T5403] netdev_register_kobject+0x183/0x3b0 [ 2034.362521][ T5403] register_netdevice+0x878/0xff0 [ 2034.362541][ T5403] ? netdev_change_features+0xb0/0xb0 [ 2034.362567][ T5403] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2034.362590][ T5403] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2034.404782][ T5403] ? tun_select_queue+0x7d0/0x7d0 [ 2034.409831][ T5403] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2034.415322][ T5403] ? tun_chr_compat_ioctl+0x30/0x30 [ 2034.420540][ T5403] ? tun_chr_compat_ioctl+0x30/0x30 [ 2034.425763][ T5403] tun_chr_ioctl+0x2b/0x40 [ 2034.430202][ T5403] do_vfs_ioctl+0xd6e/0x1390 [ 2034.434861][ T5403] ? ioctl_preallocate+0x210/0x210 [ 2034.439986][ T5403] ? __fget+0x381/0x550 [ 2034.444136][ T5403] ? ksys_dup3+0x3e0/0x3e0 [ 2034.448627][ T5403] ? tomoyo_file_ioctl+0x23/0x30 [ 2034.453613][ T5403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.459859][ T5403] ? security_file_ioctl+0x93/0xc0 [ 2034.464971][ T5403] ksys_ioctl+0xab/0xd0 [ 2034.469178][ T5403] __x64_sys_ioctl+0x73/0xb0 [ 2034.473767][ T5403] do_syscall_64+0x103/0x610 [ 2034.478364][ T5403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.484250][ T5403] RIP: 0033:0x458d99 [ 2034.488157][ T5403] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2034.507868][ T5403] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2034.516281][ T5403] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2034.524270][ T5403] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2034.532250][ T5403] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2034.540238][ T5403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2034.548206][ T5403] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 [ 2034.567569][ T5403] kobject_add_internal failed for vetÈ4 (error: -12 parent: net) 10:55:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0x2], [], @dev}}, 0x1c) 10:55:34 executing program 5 (fault-call:7 fault-nth:8): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:34 executing program 1: r0 = syz_open_dev$loop(0x0, 0x1000001, 0x401ffd) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x182) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x80000) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000000)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:55:34 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x83, 0x0, &(0x7f0000000040)) 10:55:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6eb}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:34 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000100)={r2}) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000240)=0x93) 10:55:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x101000, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000003c0)=0x1) r1 = add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000000)) ioctl(r2, 0x890c, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x1e, 0x200, 0x0, 0x0, 0x5, 0x0, 0x4, 0x81, 0x8, 0x0, 0x3f, 0x7fff, 0x7, 0x4, 0x100000001, 0x4, 0x10007fff, 0x3, 0x1, 0x4, 0x1, 0x4, 0xc5, 0x5, 0x0, 0xffffffff, 0x3, 0x6, 0x6, 0xffffffffffffff41, 0x1, 0x8000, 0x100000000003f, 0xf26, 0xa27, 0x0, 0x71ea, 0x1, @perf_bp={0x0, 0x1}, 0x2000, 0x400007, 0x5, 0x1, 0x7fff, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'bridge_slave_1\x00'}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, r1, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) r4 = getpgid(0x0) ptrace$setregset(0x4205, r4, 0x6, &(0x7f0000000700)={&(0x7f0000000800)="7587ccaf77a1afe3a6313f3cc441239aaa840fe6a1287ee816b8d6c380b95b446c5828282792d4da3bd9ea2b9ae81039dab109774a23d7722162f42793056dcff06e23737b213443717d501390581149741694a4675e9ab2d68ac8e4fef59e6bec3e86270485fd5ec09056d5528e9df99c2a9216af5657edd851ae720b31a8eeb84d70db63199b299c11f5", 0x8b}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r1, r1}, &(0x7f0000000240)=""/240, 0xf0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000740)={0x4, 0x0, [{0x4000, 0xef, &(0x7f0000000600)=""/239}, {0x2000, 0x28, &(0x7f0000000400)=""/40}, {0x0, 0xba, &(0x7f0000000500)=""/186}, {0x0, 0x0, &(0x7f0000000700)}]}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x2000, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r5, 0x4040ae79, &(0x7f0000000340)={0x4004, &(0x7f0000000180), 0x0, r6, 0xf}) 10:55:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ec}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:34 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x800000000008982, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xeba, 0x280200) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000002c0)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0, 0x0, 0x0, 0x1, 0xfffffffffffff4df, 0x0, 0x3}, 0x120) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x10000, @local, 0x9}, 0x1c) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0xc000002000000000, &(0x7f00000009c0), 0x1a4, &(0x7f00000000c0), 0x0, 0x900}}], 0x40000000000026a, 0x0) 10:55:34 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x13) r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000080)=""/103) [ 2034.803463][ T5438] FAULT_INJECTION: forcing a failure. [ 2034.803463][ T5438] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.849859][ T5438] CPU: 1 PID: 5438 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2034.857806][ T5438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.867878][ T5438] Call Trace: [ 2034.871201][ T5438] dump_stack+0x172/0x1f0 [ 2034.875561][ T5438] should_fail.cold+0xa/0x15 [ 2034.880177][ T5438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2034.886019][ T5438] ? ___might_sleep+0x163/0x280 [ 2034.890898][ T5438] __should_failslab+0x121/0x190 [ 2034.895867][ T5438] should_failslab+0x9/0x14 [ 2034.900396][ T5438] kmem_cache_alloc+0x2b2/0x6f0 [ 2034.905298][ T5438] ? __kernfs_new_node+0xc5/0x690 [ 2034.910354][ T5438] __kernfs_new_node+0xef/0x690 [ 2034.915229][ T5438] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2034.920759][ T5438] ? map_id_range_down+0x1ee/0x370 [ 2034.925896][ T5438] ? __put_user_ns+0x70/0x70 [ 2034.930522][ T5438] ? retint_kernel+0x2d/0x2d [ 2034.935139][ T5438] ? make_kgid+0x23/0x30 [ 2034.939399][ T5438] kernfs_new_node+0x99/0x130 [ 2034.944099][ T5438] kernfs_create_dir_ns+0x52/0x160 [ 2034.949237][ T5438] sysfs_create_dir_ns+0x131/0x2a0 [ 2034.954371][ T5438] ? sysfs_create_mount_point+0xa0/0xa0 [ 2034.959953][ T5438] ? net_namespace+0xd/0x40 [ 2034.964477][ T5438] ? device_namespace+0x9d/0xd0 [ 2034.969354][ T5438] kobject_add_internal.cold+0xe5/0x5d4 [ 2034.974931][ T5438] kobject_add+0x150/0x1c0 [ 2034.979371][ T5438] ? kset_create_and_add+0x1a0/0x1a0 [ 2034.984680][ T5438] ? kasan_check_read+0x11/0x20 [ 2034.989555][ T5438] ? mutex_unlock+0xd/0x10 [ 2034.994008][ T5438] device_add+0x3d5/0x18a0 [ 2034.998448][ T5438] ? device_initialize+0x440/0x440 [ 2035.003589][ T5438] ? get_device_parent.isra.0+0x570/0x570 [ 2035.009333][ T5438] ? __init_waitqueue_head+0x36/0x90 [ 2035.015243][ T5438] ? pm_runtime_init+0x311/0x3b0 [ 2035.020219][ T5438] netdev_register_kobject+0x183/0x3b0 [ 2035.025704][ T5438] register_netdevice+0x878/0xff0 [ 2035.030750][ T5438] ? netdev_change_features+0xb0/0xb0 [ 2035.036154][ T5438] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2035.041206][ T5438] ? tun_select_queue+0x7d0/0x7d0 [ 2035.046254][ T5438] ? retint_kernel+0x2d/0x2d [ 2035.050878][ T5438] ? tun_chr_compat_ioctl+0x30/0x30 [ 2035.056109][ T5438] tun_chr_ioctl+0x2b/0x40 [ 2035.060546][ T5438] do_vfs_ioctl+0xd6e/0x1390 [ 2035.065161][ T5438] ? ioctl_preallocate+0x210/0x210 [ 2035.070290][ T5438] ? __fget+0x381/0x550 [ 2035.074469][ T5438] ? ksys_dup3+0x3e0/0x3e0 [ 2035.078903][ T5438] ? retint_kernel+0x2d/0x2d [ 2035.083531][ T5438] ? tomoyo_file_ioctl+0x23/0x30 [ 2035.088536][ T5438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2035.095057][ T5438] ? security_file_ioctl+0x93/0xc0 [ 2035.100193][ T5438] ksys_ioctl+0xab/0xd0 [ 2035.104379][ T5438] __x64_sys_ioctl+0x73/0xb0 [ 2035.110415][ T5438] do_syscall_64+0x103/0x610 [ 2035.115036][ T5438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2035.120953][ T5438] RIP: 0033:0x458d99 [ 2035.124862][ T5438] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:55:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ed}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2035.145091][ T5438] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2035.153524][ T5438] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2035.161516][ T5438] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2035.169511][ T5438] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2035.177508][ T5438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2035.185497][ T5438] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 [ 2035.231630][ T5438] kobject_add_internal failed for vetÈ4 (error: -12 parent: net) 10:55:34 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ee}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:35 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0x4], [], @dev}}, 0x1c) 10:55:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f00009f6000/0x1000)=nil, 0x1000, 0x0, 0x8012, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400, 0x30) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x16, 0x9, 0x1, 0x6, 0x8000, 0x4, 0x800, 0x0, 0x5ff5d52e, 0x8, 0x1}, 0xb) setfsuid(r1) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x2, 0x5) 10:55:35 executing program 5 (fault-call:7 fault-nth:9): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da85b07f7a224ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969b213ea72d92284c6c8b4216081bf206420575278f5977f94b725862c012d", 0x62}], 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x86) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0xffffffff, 0x401}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) write$binfmt_elf32(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/440], 0x1b8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:55:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6ef}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2035.649822][ T5476] FAULT_INJECTION: forcing a failure. [ 2035.649822][ T5476] name failslab, interval 1, probability 0, space 0, times 0 [ 2035.664557][ T5476] CPU: 0 PID: 5476 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2035.672475][ T5476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2035.682567][ T5476] Call Trace: [ 2035.685878][ T5476] dump_stack+0x172/0x1f0 [ 2035.690246][ T5476] should_fail.cold+0xa/0x15 [ 2035.694868][ T5476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2035.700719][ T5476] ? __save_stack_trace+0x99/0x100 [ 2035.705867][ T5476] __should_failslab+0x121/0x190 [ 2035.710827][ T5476] should_failslab+0x9/0x14 [ 2035.715352][ T5476] kmem_cache_alloc+0x47/0x6f0 [ 2035.720225][ T5476] ? save_stack+0xa9/0xd0 [ 2035.724578][ T5476] ? save_stack+0x45/0xd0 [ 2035.728937][ T5476] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2035.734764][ T5476] ? kasan_slab_alloc+0xf/0x20 [ 2035.739810][ T5476] ? kmem_cache_alloc+0x11a/0x6f0 [ 2035.744869][ T5476] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2035.751232][ T5476] idr_get_free+0x474/0x890 [ 2035.755770][ T5476] idr_alloc_u32+0x19e/0x330 [ 2035.760382][ T5476] ? __fprop_inc_percpu_max+0x230/0x230 [ 2035.765968][ T5476] ? mark_held_locks+0xf0/0xf0 [ 2035.770751][ T5476] ? perf_trace_lock+0x510/0x510 [ 2035.775718][ T5476] idr_alloc_cyclic+0x132/0x270 [ 2035.780597][ T5476] ? idr_alloc+0x150/0x150 [ 2035.785044][ T5476] __kernfs_new_node+0x171/0x690 [ 2035.790019][ T5476] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2035.795667][ T5476] ? map_id_range_down+0x1ee/0x370 [ 2035.800803][ T5476] ? __put_user_ns+0x70/0x70 [ 2035.805422][ T5476] ? mark_held_locks+0xa4/0xf0 [ 2035.810205][ T5476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2035.815685][ T5476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2035.821165][ T5476] ? make_kgid+0x23/0x30 [ 2035.825429][ T5476] kernfs_new_node+0x99/0x130 [ 2035.830133][ T5476] kernfs_create_dir_ns+0x52/0x160 [ 2035.835265][ T5476] sysfs_create_dir_ns+0x131/0x2a0 [ 2035.840388][ T5476] ? sysfs_create_mount_point+0xa0/0xa0 [ 2035.845959][ T5476] ? device_namespace+0x6b/0xd0 [ 2035.850827][ T5476] ? net_namespace+0x1/0x40 [ 2035.855340][ T5476] ? net_namespace+0xd/0x40 [ 2035.859856][ T5476] ? device_namespace+0x9d/0xd0 [ 2035.864723][ T5476] kobject_add_internal.cold+0xe5/0x5d4 [ 2035.870381][ T5476] kobject_add+0x150/0x1c0 [ 2035.874817][ T5476] ? kset_create_and_add+0x1a0/0x1a0 [ 2035.880128][ T5476] ? kasan_check_read+0x11/0x20 [ 2035.885002][ T5476] ? mutex_unlock+0xd/0x10 [ 2035.889436][ T5476] device_add+0x3d5/0x18a0 [ 2035.893872][ T5476] ? get_device_parent.isra.0+0x570/0x570 [ 2035.899613][ T5476] netdev_register_kobject+0x183/0x3b0 [ 2035.905179][ T5476] register_netdevice+0x878/0xff0 [ 2035.910223][ T5476] ? netdev_change_features+0xb0/0xb0 [ 2035.915621][ T5476] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2035.920572][ T5476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2035.926055][ T5476] ? tun_select_queue+0x7d0/0x7d0 [ 2035.931112][ T5476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2035.936603][ T5476] ? tun_chr_compat_ioctl+0x30/0x30 [ 2035.941822][ T5476] ? tun_chr_compat_ioctl+0x30/0x30 [ 2035.947037][ T5476] tun_chr_ioctl+0x2b/0x40 [ 2035.951467][ T5476] do_vfs_ioctl+0xd6e/0x1390 [ 2035.951490][ T5476] ? ioctl_preallocate+0x210/0x210 [ 2035.951506][ T5476] ? __fget+0x381/0x550 [ 2035.951529][ T5476] ? ksys_dup3+0x3e0/0x3e0 [ 2035.951555][ T5476] ? tomoyo_file_ioctl+0x23/0x30 [ 2035.974732][ T5476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2035.980993][ T5476] ? security_file_ioctl+0x93/0xc0 [ 2035.986132][ T5476] ksys_ioctl+0xab/0xd0 [ 2035.990313][ T5476] __x64_sys_ioctl+0x73/0xb0 [ 2035.994928][ T5476] do_syscall_64+0x103/0x610 10:55:35 executing program 1: r0 = timerfd_create(0xfffffffffffefffe, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, &(0x7f0000000180)) [ 2035.999538][ T5476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2036.005440][ T5476] RIP: 0033:0x458d99 [ 2036.009342][ T5476] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2036.028963][ T5476] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2036.037394][ T5476] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 10:55:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f0}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2036.045380][ T5476] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2036.045390][ T5476] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2036.045397][ T5476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 [ 2036.045404][ T5476] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @broadcast}, {}, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}, 'veth0\x00'}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20040100}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1251122388c858d228c16c9b745117ac1918bbb5c5b5db994adeca74ac2c0f515186ee0ea4909b4bc1655c0d3ad701", @ANYRES16=r2, @ANYBLOB="09002bbd7000fcdbdf25050000000c00040001000000000000000c00060003000000000000000c00030081000000000000000c00080007000000000000000c00020041040000000000000c000400b20f0000000000000c0005000a01000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x801) r3 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) 10:55:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da85b07f7a224ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969b213ea72d92284c6c8b4216081bf206420575278f5977f94b725862c012d", 0x62}], 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x86) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0xffffffff, 0x401}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) write$binfmt_elf32(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/440], 0x1b8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:55:35 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001580)}, 0x0) socket$netlink(0x10, 0x3, 0x13) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000180)) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x519, 0x0, 0x0, 0x8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000240)={0x2, 0x3, "f1439c5949205cc0d584c24f717ecbae49787e0fe880ed7ba44bd0679c246619", 0x1f, 0x4, 0x9f, 0x7, 0x200}) 10:55:35 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x1f00, 0x0, 0x0}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x100) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x5, 0x81, 0x8, 0x6e6, 0x2, "7d4b73bfdce422c071eac9614bbfbd40046de9", 0xa518, 0xfb6}) 10:55:35 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f1}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0x6], [], @dev}}, 0x1c) 10:55:36 executing program 5 (fault-call:7 fault-nth:10): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) getdents(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) fremovexattr(r0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0xffffffffffffff9c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) 10:55:36 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x10000, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="100000271e4a16bf7f00b5"], 0x10}, 0x80) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000300)) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000110) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x100000001, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000440)={'hsr0\x00', {0x2, 0x4e23, @broadcast}}) r4 = syz_open_pts(r2, 0x2) dup3(r4, r2, 0x0) write(r2, &(0x7f00000007c0), 0x3ddbee43) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1, 0x80800) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f2}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2036.613647][ C1] net_ratelimit: 26 callbacks suppressed [ 2036.613690][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2036.622398][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2036.626042][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2036.631225][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2036.638929][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2036.643007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2036.649870][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2036.654582][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2036.654704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2036.661913][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f3}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) [ 2036.737196][ T5538] FAULT_INJECTION: forcing a failure. [ 2036.737196][ T5538] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.750230][ T5538] CPU: 0 PID: 5538 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #85 [ 2036.758146][ T5538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2036.768217][ T5538] Call Trace: [ 2036.771537][ T5538] dump_stack+0x172/0x1f0 [ 2036.775891][ T5538] should_fail.cold+0xa/0x15 [ 2036.780507][ T5538] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2036.786348][ T5538] __should_failslab+0x121/0x190 [ 2036.791301][ T5538] should_failslab+0x9/0x14 [ 2036.795821][ T5538] kmem_cache_alloc+0x47/0x6f0 [ 2036.801332][ T5538] ? save_stack+0xa9/0xd0 [ 2036.801351][ T5538] ? save_stack+0x45/0xd0 [ 2036.801367][ T5538] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2036.801379][ T5538] ? kasan_slab_alloc+0xf/0x20 [ 2036.801402][ T5538] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2036.801423][ T5538] idr_get_free+0x474/0x890 [ 2036.801453][ T5538] idr_alloc_u32+0x19e/0x330 10:55:36 executing program 1: setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x4000000, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x1000000000000008, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5c6) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x95d0, 0x22d80) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f4}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da85b07f7a224ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969b213ea72d92284c6c8b4216081bf206420575278f5977f94b725862c012d", 0x62}], 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x86) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0xffffffff, 0x401}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) write$binfmt_elf32(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/440], 0x1b8) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2036.801477][ T5538] ? __fprop_inc_percpu_max+0x230/0x230 [ 2036.841664][ T5538] ? idr_alloc_cyclic+0xc4/0x270 [ 2036.846625][ T5538] idr_alloc_cyclic+0x132/0x270 [ 2036.851500][ T5538] ? idr_alloc+0x150/0x150 [ 2036.855957][ T5538] __kernfs_new_node+0x171/0x690 [ 2036.860927][ T5538] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2036.866397][ T5538] ? map_id_range_down+0x1ee/0x370 [ 2036.871524][ T5538] ? __put_user_ns+0x70/0x70 [ 2036.876188][ T5538] ? tick_nohz_tick_stopped+0x1a/0x90 [ 2036.881575][ T5538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2036.887828][ T5538] ? make_kgid+0x23/0x30 [ 2036.892089][ T5538] kernfs_new_node+0x99/0x130 [ 2036.892117][ T5538] kernfs_create_dir_ns+0x52/0x160 [ 2036.901909][ T5538] sysfs_create_dir_ns+0x131/0x2a0 [ 2036.907059][ T5538] ? sysfs_create_mount_point+0xa0/0xa0 [ 2036.912641][ T5538] ? net_namespace+0xd/0x40 [ 2036.917165][ T5538] ? device_namespace+0x9d/0xd0 [ 2036.917187][ T5538] kobject_add_internal.cold+0xe5/0x5d4 [ 2036.917209][ T5538] kobject_add+0x150/0x1c0 [ 2036.917224][ T5538] ? kset_create_and_add+0x1a0/0x1a0 [ 2036.917246][ T5538] ? kasan_check_read+0x11/0x20 [ 2036.917278][ T5538] ? mutex_unlock+0xd/0x10 [ 2036.942267][ T5538] device_add+0x3d5/0x18a0 [ 2036.942285][ T5538] ? device_initialize+0x440/0x440 [ 2036.942306][ T5538] ? get_device_parent.isra.0+0x570/0x570 [ 2036.942332][ T5538] netdev_register_kobject+0x183/0x3b0 [ 2036.942346][ T5538] ? register_netdevice+0x870/0xff0 [ 2036.942363][ T5538] register_netdevice+0x878/0xff0 [ 2036.942384][ T5538] ? netdev_change_features+0xb0/0xb0 [ 2036.942411][ T5538] __tun_chr_ioctl+0x21c9/0x3ee0 [ 2036.942428][ T5538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2036.942453][ T5538] ? tun_select_queue+0x7d0/0x7d0 [ 2036.942471][ T5538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2036.942498][ T5538] ? tun_chr_compat_ioctl+0x30/0x30 [ 2036.993637][ T5538] tun_chr_ioctl+0x2b/0x40 [ 2037.013731][ T5538] do_vfs_ioctl+0xd6e/0x1390 [ 2037.018370][ T5538] ? ioctl_preallocate+0x210/0x210 [ 2037.018393][ T5538] ? __fget+0x381/0x550 [ 2037.027799][ T5538] ? ksys_dup3+0x3e0/0x3e0 [ 2037.032238][ T5538] ? tomoyo_file_ioctl+0x23/0x30 [ 2037.037202][ T5538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2037.043467][ T5538] ? security_file_ioctl+0x93/0xc0 [ 2037.048611][ T5538] ksys_ioctl+0xab/0xd0 [ 2037.052793][ T5538] __x64_sys_ioctl+0x73/0xb0 [ 2037.057408][ T5538] ? do_syscall_64+0xfe/0x610 [ 2037.062112][ T5538] do_syscall_64+0x103/0x610 [ 2037.066729][ T5538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2037.072635][ T5538] RIP: 0033:0x458d99 [ 2037.076541][ T5538] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2037.096173][ T5538] RSP: 002b:00007f06147dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2037.104867][ T5538] RAX: ffffffffffffffda RBX: 00007f06147dec90 RCX: 0000000000458d99 [ 2037.114351][ T5538] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 2037.122342][ T5538] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2037.130333][ T5538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f06147df6d4 10:55:36 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) fanotify_init(0x1, 0x80000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0x1, 0x3e}, 0x1, 0x1e6f, 0x5, {0x3}, 0x400}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1100000000000000000000000100000000"], 0x11}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) [ 2037.138321][ T5538] R13: 00000000004c33fe R14: 00000000004d6840 R15: 0000000000000005 10:55:36 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0x7], [], @dev}}, 0x1c) 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f5}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f6}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffaf) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, 0x0, 0xffffffffffffff6f) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0xb675b386d1ef161b) add_key$keyring(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 10:55:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0xff], 0x1f004}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000000004000000000000c1f4e90e"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:36 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000001, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x0, 0x0, 0x5c}, 0x400}) stat(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000ac0)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x1ff, 0x5}) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x2f00, 0x48, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x0, 0x82, 0x6f7}) utimes(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}) memfd_create(0x0, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) 10:55:36 executing program 1: flistxattr(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ppoll(&(0x7f0000000600)=[{r2}], 0x1, &(0x7f00000005c0)={0x0, 0x989680}, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x8001, 0xf, 0x1}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r4, &(0x7f0000000440)={'syz1'}, 0x1200e) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) [ 2037.574535][ C1] ==================================================================