_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)={0x84, @multicast1, 0x4e24, 0x0, 'fo\x00', 0x4, 0x9}, 0x2c) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) 11:48:51 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000000c0)=0x8) 11:48:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x0, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:51 executing program 3: 11:48:51 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1184, 0x2) 11:48:51 executing program 0: 11:48:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:51 executing program 5: 11:48:52 executing program 0: 11:48:52 executing program 3: 11:48:52 executing program 5: 11:48:52 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x40000) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@remote, @multicast2, 0x0, 0x4, [@rand_addr=0x8, @multicast1, @local, @multicast2]}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 11:48:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:52 executing program 0: 11:48:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x0, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:52 executing program 3: 11:48:52 executing program 5: 11:48:52 executing program 0: 11:48:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:52 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f0000000100)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 11:48:52 executing program 3: 11:48:52 executing program 5: 11:48:52 executing program 0: 11:48:52 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x0, 0x0, 0x4, {0xa, 0x4e23, 0xbcc8, @dev={0xfe, 0x80, [], 0x11}, 0x401}}}, 0x3a) 11:48:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:53 executing program 0: 11:48:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:53 executing program 5: 11:48:53 executing program 3: 11:48:53 executing program 0: 11:48:53 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000340)={'ip6tnl0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000380)={0x4, 0x0, &(0x7f0000ffb000/0x3000)=nil}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000100)={r1, r1, 0x4}) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000300)={0x1000000000000000, 0x1ffd, 0x400005, 0x4, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x480, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x108, r6, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7af2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x726a}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5285}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffff90e6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$EVIOCSABS3F(r5, 0x401845ff, &(0x7f00000003c0)={0xfffffffffffffff8, 0x4, 0x4, 0x3ff, 0x5, 0x1}) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000140)={0x4, 0x0, [{}, {}, {}, {}]}) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000200)=""/226) 11:48:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:53 executing program 5: 11:48:53 executing program 3: 11:48:53 executing program 0: 11:48:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:53 executing program 5: 11:48:54 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @initdev}, &(0x7f0000000080)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@remote, r2}, 0x14) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000100)={0x4407, 0x7, 0x6, 0x3}) 11:48:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:54 executing program 0: 11:48:54 executing program 3: 11:48:54 executing program 5: 11:48:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:54 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 11:48:54 executing program 5: 11:48:54 executing program 3: 11:48:54 executing program 0: 11:48:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:54 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x22}) 11:48:54 executing program 0: [ 475.644634] net_ratelimit: 18 callbacks suppressed [ 475.644642] protocol 88fb is buggy, dev hsr_slave_0 [ 475.654739] protocol 88fb is buggy, dev hsr_slave_1 [ 475.964627] protocol 88fb is buggy, dev hsr_slave_0 [ 475.969715] protocol 88fb is buggy, dev hsr_slave_1 11:48:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:55 executing program 3: 11:48:55 executing program 5: 11:48:55 executing program 0: 11:48:55 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 11:48:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 476.204677] protocol 88fb is buggy, dev hsr_slave_0 [ 476.209755] protocol 88fb is buggy, dev hsr_slave_1 11:48:55 executing program 0: 11:48:55 executing program 5: [ 476.284654] protocol 88fb is buggy, dev hsr_slave_0 [ 476.289751] protocol 88fb is buggy, dev hsr_slave_1 11:48:55 executing program 3: 11:48:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:55 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0xb, 0x6, 0x9, &(0x7f0000000000)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x280000, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x64400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x101000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x90080, 0x0) syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x0, 0x2) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x44a000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffff9c, 0x890c, &(0x7f0000000100)={@remote={[], 0x2}, 0xb, 'hwsim0\x00'}) 11:48:55 executing program 0: [ 476.604647] protocol 88fb is buggy, dev hsr_slave_0 [ 476.609726] protocol 88fb is buggy, dev hsr_slave_1 11:48:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}}, 0x0) 11:48:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000010004002) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) dup2(r0, r1) pwrite64(r1, &(0x7f0000000040)="b2", 0x1, 0x0) 11:48:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000140)=0x8000) 11:48:56 executing program 0: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="054fcff8f1b02fc73cb00040ffb7ee236bec5def00ffffffffffffffb960b174956b2f0e9ea6acb26687cf6930e59b85c27fab79435be3aa6d"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 11:48:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:56 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0xc719, 0x80000000}]}, 0xc, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 11:48:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 11:48:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r4, &(0x7f00000001c0)={0x7}, 0x102fe) r5 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280)={0x7}, 0xff7f) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x9f}) 11:48:56 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 11:48:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000140)=0x8000) 11:48:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}}, 0x0) 11:48:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:56 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x5}, @in={0x2, 0x4e20, @multicast2}], 0x3c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x10000, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/228, 0xe4}, {&(0x7f0000000280)=""/100, 0x64}, {&(0x7f0000000300)=""/156, 0x9c}], 0x3, &(0x7f0000000400)=""/234, 0xea}, 0x7f}, {{&(0x7f0000000500)=@pppoe, 0x80, &(0x7f0000000980)=[{&(0x7f0000000580)=""/28, 0x1c}, {&(0x7f00000005c0)=""/123, 0x7b}, {&(0x7f0000000640)=""/98, 0x62}, {&(0x7f00000006c0)=""/25, 0x19}, {&(0x7f0000000700)=""/69, 0x45}, {&(0x7f0000000780)=""/248, 0xf8}, {&(0x7f0000000880)=""/51, 0x33}, {&(0x7f00000008c0)=""/150, 0x96}], 0x8, &(0x7f0000000a00)=""/112, 0x70}, 0x5dcd}, {{&(0x7f0000000a80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000b00)=""/119, 0x77}, {&(0x7f0000000b80)=""/234, 0xea}, {&(0x7f0000000c80)=""/122, 0x7a}, {&(0x7f0000000d00)=""/132, 0x84}, {&(0x7f0000000dc0)=""/241, 0xf1}, {&(0x7f0000000ec0)=""/63, 0x3f}, {&(0x7f0000000f00)=""/14, 0xe}], 0x7, &(0x7f0000000fc0)=""/220, 0xdc}, 0xcc}, {{&(0x7f00000010c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001140)=""/8, 0x8}, {&(0x7f0000001180)=""/44, 0x2c}], 0x2}, 0x1f}, {{&(0x7f0000001200)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001280)=""/67, 0x43}, {&(0x7f0000001300)=""/216, 0xd8}], 0x2, &(0x7f0000001440)=""/242, 0xf2}, 0x20}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001540)=""/156, 0x9c}, {&(0x7f0000001600)}, {&(0x7f0000001640)=""/253, 0xfd}, {&(0x7f0000001740)=""/224, 0xe0}, {&(0x7f0000001840)=""/235, 0xeb}, {&(0x7f0000001940)=""/65, 0x41}], 0x6, &(0x7f0000001a40)=""/37, 0x25}}, {{&(0x7f0000001a80)=@tipc=@id, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/136, 0x88}, {&(0x7f0000001bc0)=""/139, 0x8b}], 0x2, &(0x7f0000001cc0)=""/124, 0x7c}, 0x2}, {{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000001d40)=""/57, 0x39}, {&(0x7f0000001d80)=""/222, 0xde}, {&(0x7f0000001e80)=""/79, 0x4f}, {&(0x7f0000001f00)=""/98, 0x62}, {&(0x7f0000001f80)=""/17, 0x11}, {&(0x7f0000001fc0)=""/216, 0xd8}, {&(0x7f00000020c0)=""/135, 0x87}], 0x7, &(0x7f0000002200)=""/42, 0x2a}, 0x7}, {{&(0x7f0000002240)=@generic, 0x80, &(0x7f00000024c0)=[{&(0x7f00000022c0)=""/228, 0xe4}, {&(0x7f00000023c0)=""/71, 0x47}, {&(0x7f0000002440)=""/115, 0x73}], 0x3}, 0x480000000000}, {{&(0x7f0000002500)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000003840)=[{&(0x7f0000002580)=""/182, 0xb6}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/169, 0xa9}, {&(0x7f0000003700)=""/24, 0x18}, {&(0x7f0000003740)=""/227, 0xe3}], 0x5, &(0x7f00000038c0)=""/138, 0x8a}, 0xfffffffffffffaba}], 0xa, 0x20, &(0x7f0000003c00)) sendmsg$can_raw(r2, &(0x7f0000003d40)={&(0x7f0000003c40)={0x1d, r3}, 0x10, &(0x7f0000003d00)={&(0x7f0000003c80)=@canfd={{0x4, 0x20, 0x400, 0x80000001}, 0x20, 0x1, 0x0, 0x0, "dca9270f3d70e9ab237cc770d53d2b8b141eca8cf4ba1770a31248f394f4839b52640c224caa6d612b5a12fa5cba177f6fd9ad42c4a70c5f55fbe28e8f1df0c0"}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) 11:48:56 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440000, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x3) connect(r0, 0x0, 0xfffffffffffffdcb) mkdir(0x0, 0xc) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) lstat(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000001300)='/dev/full\x00', 0x280, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f00000000c0)) r2 = gettid() r3 = gettid() clone(0x20120000, &(0x7f0000000100)="866633c1d416452332dcc8cbf8c623369de21b6b7dcf785ff9b0274c1f4e2bef0300018c54f0fa4c51cf93cad9437bfda26cdffaa17ce15e53e9ecd6abd4b1ebc1cc", 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200)="3ac076e8bd22e901692cc94bc90b4d625cb616ddabe888a054d2e7219e73ba290dab7888e2a1cdf82f5b371e389ac440aee370f7f4c6e40361aa8ac2129114c8bced2841023f2c41b5ddc10d6bfadd91bba3f87561a6f7a33e6ddf246b22103a98d05355f7a7c617e70312b9cf9acbe9ee94fc639a6f23b83fca1137b62b1591fc3c2a80133cd7e5eb0f2bc887e4445a7c8b74d4f9d7f8a2cec8812bddeab71c363aafb3b7793845d1f6074d27a417e3e38fcda9841108feec0a99e3b2e80d39778c92d8986644496d6a43b96c11d3b0429afff4423dfb8bf506aa7e62cacdf6e86d2d6b6123f8", &(0x7f0000000300)="ec97e5987151c40395b84ab5a3fbd83839b3d34e237ee424377e828351687c787b226f96009ce4a3316a0a2f45e3f148226fc86ca3eb9693bad0c3a1d8"}}, &(0x7f00009b1ffc)) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x19) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYPTR], 0x8}}, 0x0) tkill(r2, 0x14) tkill(r2, 0x1000000000016) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x5) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x4e32, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) 11:48:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mkdir(0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000000)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x41a0ae8d, &(0x7f0000000140)) 11:48:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}}, 0x0) 11:48:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mkdir(0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000000)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x41a0ae8d, &(0x7f0000000140)) 11:48:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mkdir(0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000000)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x41a0ae8d, &(0x7f0000000140)) 11:48:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r3, &(0x7f0000000280)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40240}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000340)={0x62c, 0x42, 0x308, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x2bc, 0x1, [@generic="0a3707d1aaf8138db33e4164210e698677fb7e7763fe265c44b49ece1de0d102cadbdc7753271b7710e07d7e73f56142f5a432ee82c42aaa38b5bf8e9de96ed893dedf28d47ed620df0692bce4db", @generic="26265c3b4acdd5daea4e17295945f5e4fac3dac8e75a7708362c94901f14c944c7a7a4c413384264c504c3949b6e5eb7104e19b21eaf121a6bd5a378844b4b3c694832d01c17ede2b31b403747834b7bb1e5b6ff8a85f19e618e0399d9bb6844b425b535016a4fc7ea00e3666b2a30b82d10657ca0a69824ff9298401d1fdca55744ef5258ebb0920224097689f1ae6641932981a94afd8f8cbecc0f69a965694adbdaffe2034aeee22de8a6b08439468e976c1a5f52517ce1061ad6c702ff1ebb4d894fec44a32eba18f16a70a8f743fcff02418c6d56f5", @typed={0x8, 0x1c, @u32=0x6}, @generic="250185a5a9929904f81a33f880cb52763d9eec51aa0179c880ad070e8e697f97127a97863b3575b2a7c86890c7fa9d47ff0784b0c853e343b0aef099ba8ecda99c8aca1a39b029d9cf215af98084aac79f2dc02c073d1f587ae337397f021cbe681d6bd95006b6027898311dd2b5240a2a69b46d5507ea7dfd5e9e1aa1e21e45bc35057aba196b0a6f2e6df3a4b35cc64b4c4c4aab7d933dce0e48b82ea53e2414b9dbf5fbe8fd4815a3be018213e4c787a033a62948272036f66aaee75f17f2b174", @generic="344dadd45e4dc8a26012de8e79dd266fa46cfd6a55f477f806e35fa15dcba68a1e781e6d169a1e39a6aec7f2804ff0ff12bd6582643a48a4e5c146f333accfbe1012b751f5043cadeca23c841396d801064da5155d4d3cb5b78adc48fa4a4f85f80cb1d0515700211c1dbed9769ca6efc1ac71311e2b67b7243f52e6cd246482cb1ebe20270218b5329eae261afdc07c7ba6cd0cbe", @generic="2abc5f872ecba99ae0d1fe38a2b8b50fa0e22351240147ae79dedc28d5d37ceba88f0e", @typed={0x8, 0x48, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @typed={0x8, 0x71, @u32=0x2}]}, @nested={0x90, 0x20, [@generic="6841c0a9fab7316041462467914774db1870f597e2c7d87b2975c3d805edf5f534d8fd7980b50d93b0fd7802d38a934e32f228fcde72e049519f5c990dd0d2941e912ae2f13a9de9c666c4cf625d68f20ae939b0ecfbf7d9e2ad79fef9abe6e393a2754d04bf42", @generic="7a5c932cf5e63ff7db85696dba475c3a4ddb3d8177ac8f07346ce362d111528417c8fe"]}, @nested={0x1b8, 0x5, [@typed={0xc, 0x14, @u64=0x5}, @generic="cc4d9909c781e2b687b18e03f4c4afabc0a65215809ee83fb724ea75a0f9fe747f75ab13a851ab40b0461f8f37f49de9aa3c7c242c86a491659b7789f08e16ddf35c62958e9b933171e11442c287de3c6bffd5b85d2d540b0d7304d5aeb74f8a3ae925d962ae88c221406984ff28c665918266f7489d00c26547903d7b200197352e8314f2c037a40896d7521dbaae8630c8ac1b08e830407e38028fb973492bbc8cc6e5dc2ba85588013a5cb53f9bcd2f98d1c3afda73215eeb06eeb1c05120a1212109ceb0f4645acd42aa9426c1", @generic="4ac6d04fbbe1f4984651d669ff479429ebc937b73132f970b27266d5c9af085c30caa284de9978daebf38c3c5826bae0200b4d870dab7c059c96540d2dcc9f8a5eacc11977e6f2349e303f78d84583c1ad9fbb95fc357b6cdc7552e8f448c4046eb7c579a20340d2623c4d106b3a8f9afd29955da5d0f81dbfb6dbd65c3b4276278054aec395492713b3f1e8a2dcfce87a7c8669ebf92a319ec13536e51a34d5c9f6d79a51407830e04ca8514cc7ac3ffb44d47172d33e51f0204bd46294a6e7796ef833985e2a7dafc2a78f0c73acbf4c094eb9fc24c0a9"]}, @typed={0x14, 0x2c, @ipv6=@local}, @nested={0x104, 0x89, [@generic="cd2d71dff52b4022e7fd775bfb869387299bcb96e5e1d49dea598ea6402415dccf5264d5c3c8a3d94f30278b6f4eb5dbdf90e5c84763458703c61701dd5458106798cec2f59a05e1478c82c424a4793750ff9c8d990a4633f48e10a711e458cd70e218add80855456ccd322c79b6a9e6928ce0fcfa7af91673e20a7410e1364bc65a1689857fc4d243488597ad1324db4c48dd8101d207920587ce2bd9b1faa52988dc80ef0237654a47d82a0777a09463834efdfb1a6fa8a21d14a73ebb33ab6490e0e9724882db018797bf1841463af704296327cb7902d86fb5dae0af62b156f1087d070a8c650a3f3ec0724a86cc77728178aa37", @typed={0x8, 0x6a, @str='-\x00'}]}]}, 0x62c}, {&(0x7f0000000a80)={0x404, 0x12, 0x2, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x170, 0x24, [@generic="fbd29c0c98fe7fddabf9e4578732b644e298e0976b57caa5730c9b10040173b71cef2540ff6a9272d00d264032927175e5f599d97121a55c49ffab8dc1d1bb3c38a61781482dde7e27c4363a04148402e2b5f07abc78aa33b2ac2b10e4947cdae6aae553228be12c0a5e5e4a1d337823ea6c4a952c68e9ce88e0b20f0a24647fe7dfc645b3e7884108791e587fe5096a8050e6172430edb99016a4230ffa89fa27b07b6f69fe97aeebea861bd4ead40d29ac80c9910152f9857049fbf52f6bb5b60c9df4", @generic="d2b6cd21af3253f1b15aec62c85fedfefe13229cef3b3687b404b81b4391dd2e2693fa53a3658a731d936f94c2c84bd83d9905ff41d81fae00ab7e1bd1a4d18dd9bd3e77a32230f38954074648cbe408ce97a81da401a64e67c864c2f20e0251540e8775580146fb7a6713bd53b1df60bdb2f2f524b78e8ef7096c1f35a508068731e7e9041c6811df", @typed={0x14, 0x8f, @ipv6=@remote}, @typed={0x8, 0x70, @fd=r0}]}, @typed={0x8, 0x88, @uid=r4}, @nested={0x154, 0x5b, [@generic="3548d8b44fa95d61bf91964ee6eb8aac5fbf1367e273f8202b68b3a78a862e840b6b307276d685f3841772be2ecea16b97e83204f9c8a7130324001776d0c920081daf5c3526d04c088b0a1b1869875d5b6951ee50e5175de9186dbcc5b904e27542e8b01dac237a5076a96efbda3b25a2b463cd6699eb2b73a4b69cdd6ef7b2ff5e625dd40cda22d898652249b7e1e3a23d0f207fb9ca448f3f715db2b56a81742168d621d72a5dfbfa6639bc1f7f76881e", @generic="0de71a07f2e9b57924b16c65a97e342977538591aca0aa8c6a35fe2c0cb2ee210d6865fc9ca006589a9918d4656b985501d8292b331a154ab4f39b9d8fc0583711e8b5575189592cd87d3e573d1236fb2d6bd7174bf3c0499612daee6eeef03598d63cdfe655cd88ebff0eaf427404e19feba254de14deb76e1baa5ef21516c6986167208e76d0084c021a8f81547d9a253190e28c05b32681f52e"]}, @generic="76a2e90d588e10042873984f90c7dcb9370674160417792f12e0d5b48edd9cf2641f87aabb293c61308acfc50f33cb60e497f89a3e25f9140098d29d6267b66aff51a02563f58e6686d17b0ad394fd2a71e9dea7c842a2620d4dedecf13679d98419b2b459848ef5b9dd21aaf2941b8ddb3f6359bf57a1f7e8f75243606c10289a06ce48e15e4fea174daf9b29878114f836edf270339345bdab5941e7809cc92d8b63032a7e39bb8f6d4cfaef1505a27eace8f148730a437e7de4670b3560aa326ba136715e4833ddc566fe23b9408364591bb7c7e301e76933ea7b82e167ff09864124abb0ce18c3d1de548e7b91e92794e97de2e2527a1cbbd52e", @generic="a410c7cce03384f848d9f445332a7778a44b1f004acce9255eea13fd44ae50da439caaff95426cca21ba990e"]}, 0x404}, {&(0x7f0000000ec0)={0x158, 0x15, 0xd13, 0x70bd27, 0x25dfdbfb, "", [@generic="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", @generic="0bc59093967c8db589337a7b3ef3271c163feaa041f61df3ef6e04540a11c33ffe7be0adfe2682497edbf85741315d87c059287a1807dc", @typed={0x8, 0x2d, @fd=r1}, @typed={0x8, 0x3b, @fd=r0}]}, 0x158}], 0x3, 0x0, 0x0, 0x850}, 0x40) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(r2, 0x540c) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x10}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r6, 0x5452, &(0x7f0000000300)=0xf6c) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xc0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r7, 0x6, 0x15, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f00000000c0)=0x7f, 0x4) r8 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, 0x0) 11:48:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r3, &(0x7f0000000280)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40240}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000340)={0x62c, 0x42, 0x308, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x2bc, 0x1, [@generic="0a3707d1aaf8138db33e4164210e698677fb7e7763fe265c44b49ece1de0d102cadbdc7753271b7710e07d7e73f56142f5a432ee82c42aaa38b5bf8e9de96ed893dedf28d47ed620df0692bce4db", @generic="26265c3b4acdd5daea4e17295945f5e4fac3dac8e75a7708362c94901f14c944c7a7a4c413384264c504c3949b6e5eb7104e19b21eaf121a6bd5a378844b4b3c694832d01c17ede2b31b403747834b7bb1e5b6ff8a85f19e618e0399d9bb6844b425b535016a4fc7ea00e3666b2a30b82d10657ca0a69824ff9298401d1fdca55744ef5258ebb0920224097689f1ae6641932981a94afd8f8cbecc0f69a965694adbdaffe2034aeee22de8a6b08439468e976c1a5f52517ce1061ad6c702ff1ebb4d894fec44a32eba18f16a70a8f743fcff02418c6d56f5", @typed={0x8, 0x1c, @u32=0x6}, @generic="250185a5a9929904f81a33f880cb52763d9eec51aa0179c880ad070e8e697f97127a97863b3575b2a7c86890c7fa9d47ff0784b0c853e343b0aef099ba8ecda99c8aca1a39b029d9cf215af98084aac79f2dc02c073d1f587ae337397f021cbe681d6bd95006b6027898311dd2b5240a2a69b46d5507ea7dfd5e9e1aa1e21e45bc35057aba196b0a6f2e6df3a4b35cc64b4c4c4aab7d933dce0e48b82ea53e2414b9dbf5fbe8fd4815a3be018213e4c787a033a62948272036f66aaee75f17f2b174", @generic="344dadd45e4dc8a26012de8e79dd266fa46cfd6a55f477f806e35fa15dcba68a1e781e6d169a1e39a6aec7f2804ff0ff12bd6582643a48a4e5c146f333accfbe1012b751f5043cadeca23c841396d801064da5155d4d3cb5b78adc48fa4a4f85f80cb1d0515700211c1dbed9769ca6efc1ac71311e2b67b7243f52e6cd246482cb1ebe20270218b5329eae261afdc07c7ba6cd0cbe", @generic="2abc5f872ecba99ae0d1fe38a2b8b50fa0e22351240147ae79dedc28d5d37ceba88f0e", @typed={0x8, 0x48, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @typed={0x8, 0x71, @u32=0x2}]}, @nested={0x90, 0x20, [@generic="6841c0a9fab7316041462467914774db1870f597e2c7d87b2975c3d805edf5f534d8fd7980b50d93b0fd7802d38a934e32f228fcde72e049519f5c990dd0d2941e912ae2f13a9de9c666c4cf625d68f20ae939b0ecfbf7d9e2ad79fef9abe6e393a2754d04bf42", @generic="7a5c932cf5e63ff7db85696dba475c3a4ddb3d8177ac8f07346ce362d111528417c8fe"]}, @nested={0x1b8, 0x5, [@typed={0xc, 0x14, @u64=0x5}, @generic="cc4d9909c781e2b687b18e03f4c4afabc0a65215809ee83fb724ea75a0f9fe747f75ab13a851ab40b0461f8f37f49de9aa3c7c242c86a491659b7789f08e16ddf35c62958e9b933171e11442c287de3c6bffd5b85d2d540b0d7304d5aeb74f8a3ae925d962ae88c221406984ff28c665918266f7489d00c26547903d7b200197352e8314f2c037a40896d7521dbaae8630c8ac1b08e830407e38028fb973492bbc8cc6e5dc2ba85588013a5cb53f9bcd2f98d1c3afda73215eeb06eeb1c05120a1212109ceb0f4645acd42aa9426c1", @generic="4ac6d04fbbe1f4984651d669ff479429ebc937b73132f970b27266d5c9af085c30caa284de9978daebf38c3c5826bae0200b4d870dab7c059c96540d2dcc9f8a5eacc11977e6f2349e303f78d84583c1ad9fbb95fc357b6cdc7552e8f448c4046eb7c579a20340d2623c4d106b3a8f9afd29955da5d0f81dbfb6dbd65c3b4276278054aec395492713b3f1e8a2dcfce87a7c8669ebf92a319ec13536e51a34d5c9f6d79a51407830e04ca8514cc7ac3ffb44d47172d33e51f0204bd46294a6e7796ef833985e2a7dafc2a78f0c73acbf4c094eb9fc24c0a9"]}, @typed={0x14, 0x2c, @ipv6=@local}, @nested={0x104, 0x89, [@generic="cd2d71dff52b4022e7fd775bfb869387299bcb96e5e1d49dea598ea6402415dccf5264d5c3c8a3d94f30278b6f4eb5dbdf90e5c84763458703c61701dd5458106798cec2f59a05e1478c82c424a4793750ff9c8d990a4633f48e10a711e458cd70e218add80855456ccd322c79b6a9e6928ce0fcfa7af91673e20a7410e1364bc65a1689857fc4d243488597ad1324db4c48dd8101d207920587ce2bd9b1faa52988dc80ef0237654a47d82a0777a09463834efdfb1a6fa8a21d14a73ebb33ab6490e0e9724882db018797bf1841463af704296327cb7902d86fb5dae0af62b156f1087d070a8c650a3f3ec0724a86cc77728178aa37", @typed={0x8, 0x6a, @str='-\x00'}]}]}, 0x62c}, {&(0x7f0000000a80)={0x404, 0x12, 0x2, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x170, 0x24, [@generic="fbd29c0c98fe7fddabf9e4578732b644e298e0976b57caa5730c9b10040173b71cef2540ff6a9272d00d264032927175e5f599d97121a55c49ffab8dc1d1bb3c38a61781482dde7e27c4363a04148402e2b5f07abc78aa33b2ac2b10e4947cdae6aae553228be12c0a5e5e4a1d337823ea6c4a952c68e9ce88e0b20f0a24647fe7dfc645b3e7884108791e587fe5096a8050e6172430edb99016a4230ffa89fa27b07b6f69fe97aeebea861bd4ead40d29ac80c9910152f9857049fbf52f6bb5b60c9df4", @generic="d2b6cd21af3253f1b15aec62c85fedfefe13229cef3b3687b404b81b4391dd2e2693fa53a3658a731d936f94c2c84bd83d9905ff41d81fae00ab7e1bd1a4d18dd9bd3e77a32230f38954074648cbe408ce97a81da401a64e67c864c2f20e0251540e8775580146fb7a6713bd53b1df60bdb2f2f524b78e8ef7096c1f35a508068731e7e9041c6811df", @typed={0x14, 0x8f, @ipv6=@remote}, @typed={0x8, 0x70, @fd=r0}]}, @typed={0x8, 0x88, @uid=r4}, @nested={0x154, 0x5b, [@generic="3548d8b44fa95d61bf91964ee6eb8aac5fbf1367e273f8202b68b3a78a862e840b6b307276d685f3841772be2ecea16b97e83204f9c8a7130324001776d0c920081daf5c3526d04c088b0a1b1869875d5b6951ee50e5175de9186dbcc5b904e27542e8b01dac237a5076a96efbda3b25a2b463cd6699eb2b73a4b69cdd6ef7b2ff5e625dd40cda22d898652249b7e1e3a23d0f207fb9ca448f3f715db2b56a81742168d621d72a5dfbfa6639bc1f7f76881e", @generic="0de71a07f2e9b57924b16c65a97e342977538591aca0aa8c6a35fe2c0cb2ee210d6865fc9ca006589a9918d4656b985501d8292b331a154ab4f39b9d8fc0583711e8b5575189592cd87d3e573d1236fb2d6bd7174bf3c0499612daee6eeef03598d63cdfe655cd88ebff0eaf427404e19feba254de14deb76e1baa5ef21516c6986167208e76d0084c021a8f81547d9a253190e28c05b32681f52e"]}, @generic="76a2e90d588e10042873984f90c7dcb9370674160417792f12e0d5b48edd9cf2641f87aabb293c61308acfc50f33cb60e497f89a3e25f9140098d29d6267b66aff51a02563f58e6686d17b0ad394fd2a71e9dea7c842a2620d4dedecf13679d98419b2b459848ef5b9dd21aaf2941b8ddb3f6359bf57a1f7e8f75243606c10289a06ce48e15e4fea174daf9b29878114f836edf270339345bdab5941e7809cc92d8b63032a7e39bb8f6d4cfaef1505a27eace8f148730a437e7de4670b3560aa326ba136715e4833ddc566fe23b9408364591bb7c7e301e76933ea7b82e167ff09864124abb0ce18c3d1de548e7b91e92794e97de2e2527a1cbbd52e", @generic="a410c7cce03384f848d9f445332a7778a44b1f004acce9255eea13fd44ae50da439caaff95426cca21ba990e"]}, 0x404}, {&(0x7f0000000ec0)={0x158, 0x15, 0xd13, 0x70bd27, 0x25dfdbfb, "", [@generic="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", @generic="0bc59093967c8db589337a7b3ef3271c163feaa041f61df3ef6e04540a11c33ffe7be0adfe2682497edbf85741315d87c059287a1807dc", @typed={0x8, 0x2d, @fd=r1}, @typed={0x8, 0x3b, @fd=r0}]}, 0x158}], 0x3, 0x0, 0x0, 0x850}, 0x40) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(r2, 0x540c) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x10}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r6, 0x5452, &(0x7f0000000300)=0xf6c) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xc0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r7, 0x6, 0x15, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f00000000c0)=0x7f, 0x4) r8 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, 0x0) 11:48:57 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r4, 0xf9, 0xdc, 0x4, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) 11:48:57 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) select(0x40, &(0x7f0000000000)={0x400, 0x3, 0x2, 0x284, 0x2c7, 0x7, 0x6, 0x6}, &(0x7f0000000040)={0x7fff, 0x8, 0x0, 0xae8, 0x0, 0x8d, 0x6, 0x1ff}, &(0x7f0000000080)={0xffffffff00000000, 0x9, 0x9a, 0xcef, 0x1000, 0x20, 0x81, 0x9}, &(0x7f00000000c0)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 11:48:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r3, &(0x7f0000000280)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40240}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000340)={0x62c, 0x42, 0x308, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x2bc, 0x1, [@generic="0a3707d1aaf8138db33e4164210e698677fb7e7763fe265c44b49ece1de0d102cadbdc7753271b7710e07d7e73f56142f5a432ee82c42aaa38b5bf8e9de96ed893dedf28d47ed620df0692bce4db", @generic="26265c3b4acdd5daea4e17295945f5e4fac3dac8e75a7708362c94901f14c944c7a7a4c413384264c504c3949b6e5eb7104e19b21eaf121a6bd5a378844b4b3c694832d01c17ede2b31b403747834b7bb1e5b6ff8a85f19e618e0399d9bb6844b425b535016a4fc7ea00e3666b2a30b82d10657ca0a69824ff9298401d1fdca55744ef5258ebb0920224097689f1ae6641932981a94afd8f8cbecc0f69a965694adbdaffe2034aeee22de8a6b08439468e976c1a5f52517ce1061ad6c702ff1ebb4d894fec44a32eba18f16a70a8f743fcff02418c6d56f5", @typed={0x8, 0x1c, @u32=0x6}, @generic="250185a5a9929904f81a33f880cb52763d9eec51aa0179c880ad070e8e697f97127a97863b3575b2a7c86890c7fa9d47ff0784b0c853e343b0aef099ba8ecda99c8aca1a39b029d9cf215af98084aac79f2dc02c073d1f587ae337397f021cbe681d6bd95006b6027898311dd2b5240a2a69b46d5507ea7dfd5e9e1aa1e21e45bc35057aba196b0a6f2e6df3a4b35cc64b4c4c4aab7d933dce0e48b82ea53e2414b9dbf5fbe8fd4815a3be018213e4c787a033a62948272036f66aaee75f17f2b174", @generic="344dadd45e4dc8a26012de8e79dd266fa46cfd6a55f477f806e35fa15dcba68a1e781e6d169a1e39a6aec7f2804ff0ff12bd6582643a48a4e5c146f333accfbe1012b751f5043cadeca23c841396d801064da5155d4d3cb5b78adc48fa4a4f85f80cb1d0515700211c1dbed9769ca6efc1ac71311e2b67b7243f52e6cd246482cb1ebe20270218b5329eae261afdc07c7ba6cd0cbe", @generic="2abc5f872ecba99ae0d1fe38a2b8b50fa0e22351240147ae79dedc28d5d37ceba88f0e", @typed={0x8, 0x48, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @typed={0x8, 0x71, @u32=0x2}]}, @nested={0x90, 0x20, [@generic="6841c0a9fab7316041462467914774db1870f597e2c7d87b2975c3d805edf5f534d8fd7980b50d93b0fd7802d38a934e32f228fcde72e049519f5c990dd0d2941e912ae2f13a9de9c666c4cf625d68f20ae939b0ecfbf7d9e2ad79fef9abe6e393a2754d04bf42", @generic="7a5c932cf5e63ff7db85696dba475c3a4ddb3d8177ac8f07346ce362d111528417c8fe"]}, @nested={0x1b8, 0x5, [@typed={0xc, 0x14, @u64=0x5}, @generic="cc4d9909c781e2b687b18e03f4c4afabc0a65215809ee83fb724ea75a0f9fe747f75ab13a851ab40b0461f8f37f49de9aa3c7c242c86a491659b7789f08e16ddf35c62958e9b933171e11442c287de3c6bffd5b85d2d540b0d7304d5aeb74f8a3ae925d962ae88c221406984ff28c665918266f7489d00c26547903d7b200197352e8314f2c037a40896d7521dbaae8630c8ac1b08e830407e38028fb973492bbc8cc6e5dc2ba85588013a5cb53f9bcd2f98d1c3afda73215eeb06eeb1c05120a1212109ceb0f4645acd42aa9426c1", @generic="4ac6d04fbbe1f4984651d669ff479429ebc937b73132f970b27266d5c9af085c30caa284de9978daebf38c3c5826bae0200b4d870dab7c059c96540d2dcc9f8a5eacc11977e6f2349e303f78d84583c1ad9fbb95fc357b6cdc7552e8f448c4046eb7c579a20340d2623c4d106b3a8f9afd29955da5d0f81dbfb6dbd65c3b4276278054aec395492713b3f1e8a2dcfce87a7c8669ebf92a319ec13536e51a34d5c9f6d79a51407830e04ca8514cc7ac3ffb44d47172d33e51f0204bd46294a6e7796ef833985e2a7dafc2a78f0c73acbf4c094eb9fc24c0a9"]}, @typed={0x14, 0x2c, @ipv6=@local}, @nested={0x104, 0x89, [@generic="cd2d71dff52b4022e7fd775bfb869387299bcb96e5e1d49dea598ea6402415dccf5264d5c3c8a3d94f30278b6f4eb5dbdf90e5c84763458703c61701dd5458106798cec2f59a05e1478c82c424a4793750ff9c8d990a4633f48e10a711e458cd70e218add80855456ccd322c79b6a9e6928ce0fcfa7af91673e20a7410e1364bc65a1689857fc4d243488597ad1324db4c48dd8101d207920587ce2bd9b1faa52988dc80ef0237654a47d82a0777a09463834efdfb1a6fa8a21d14a73ebb33ab6490e0e9724882db018797bf1841463af704296327cb7902d86fb5dae0af62b156f1087d070a8c650a3f3ec0724a86cc77728178aa37", @typed={0x8, 0x6a, @str='-\x00'}]}]}, 0x62c}, {&(0x7f0000000a80)={0x404, 0x12, 0x2, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x170, 0x24, [@generic="fbd29c0c98fe7fddabf9e4578732b644e298e0976b57caa5730c9b10040173b71cef2540ff6a9272d00d264032927175e5f599d97121a55c49ffab8dc1d1bb3c38a61781482dde7e27c4363a04148402e2b5f07abc78aa33b2ac2b10e4947cdae6aae553228be12c0a5e5e4a1d337823ea6c4a952c68e9ce88e0b20f0a24647fe7dfc645b3e7884108791e587fe5096a8050e6172430edb99016a4230ffa89fa27b07b6f69fe97aeebea861bd4ead40d29ac80c9910152f9857049fbf52f6bb5b60c9df4", @generic="d2b6cd21af3253f1b15aec62c85fedfefe13229cef3b3687b404b81b4391dd2e2693fa53a3658a731d936f94c2c84bd83d9905ff41d81fae00ab7e1bd1a4d18dd9bd3e77a32230f38954074648cbe408ce97a81da401a64e67c864c2f20e0251540e8775580146fb7a6713bd53b1df60bdb2f2f524b78e8ef7096c1f35a508068731e7e9041c6811df", @typed={0x14, 0x8f, @ipv6=@remote}, @typed={0x8, 0x70, @fd=r0}]}, @typed={0x8, 0x88, @uid=r4}, @nested={0x154, 0x5b, [@generic="3548d8b44fa95d61bf91964ee6eb8aac5fbf1367e273f8202b68b3a78a862e840b6b307276d685f3841772be2ecea16b97e83204f9c8a7130324001776d0c920081daf5c3526d04c088b0a1b1869875d5b6951ee50e5175de9186dbcc5b904e27542e8b01dac237a5076a96efbda3b25a2b463cd6699eb2b73a4b69cdd6ef7b2ff5e625dd40cda22d898652249b7e1e3a23d0f207fb9ca448f3f715db2b56a81742168d621d72a5dfbfa6639bc1f7f76881e", @generic="0de71a07f2e9b57924b16c65a97e342977538591aca0aa8c6a35fe2c0cb2ee210d6865fc9ca006589a9918d4656b985501d8292b331a154ab4f39b9d8fc0583711e8b5575189592cd87d3e573d1236fb2d6bd7174bf3c0499612daee6eeef03598d63cdfe655cd88ebff0eaf427404e19feba254de14deb76e1baa5ef21516c6986167208e76d0084c021a8f81547d9a253190e28c05b32681f52e"]}, @generic="76a2e90d588e10042873984f90c7dcb9370674160417792f12e0d5b48edd9cf2641f87aabb293c61308acfc50f33cb60e497f89a3e25f9140098d29d6267b66aff51a02563f58e6686d17b0ad394fd2a71e9dea7c842a2620d4dedecf13679d98419b2b459848ef5b9dd21aaf2941b8ddb3f6359bf57a1f7e8f75243606c10289a06ce48e15e4fea174daf9b29878114f836edf270339345bdab5941e7809cc92d8b63032a7e39bb8f6d4cfaef1505a27eace8f148730a437e7de4670b3560aa326ba136715e4833ddc566fe23b9408364591bb7c7e301e76933ea7b82e167ff09864124abb0ce18c3d1de548e7b91e92794e97de2e2527a1cbbd52e", @generic="a410c7cce03384f848d9f445332a7778a44b1f004acce9255eea13fd44ae50da439caaff95426cca21ba990e"]}, 0x404}, {&(0x7f0000000ec0)={0x158, 0x15, 0xd13, 0x70bd27, 0x25dfdbfb, "", [@generic="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", @generic="0bc59093967c8db589337a7b3ef3271c163feaa041f61df3ef6e04540a11c33ffe7be0adfe2682497edbf85741315d87c059287a1807dc", @typed={0x8, 0x2d, @fd=r1}, @typed={0x8, 0x3b, @fd=r0}]}, 0x158}], 0x3, 0x0, 0x0, 0x850}, 0x40) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(r2, 0x540c) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x10}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r6, 0x5452, &(0x7f0000000300)=0xf6c) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xc0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r7, 0x6, 0x15, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f00000000c0)=0x7f, 0x4) r8 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, 0x0) 11:48:57 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r4, 0xf9, 0xdc, 0x4, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) 11:48:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340), 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:57 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10001, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) r1 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$key(r1, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x41a0ae8d, &(0x7f0000000140)) 11:48:57 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5b8e, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000200)={[0x3000, 0x1, 0x3000, 0x5000], 0x8, 0x20, 0x100000000}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x210180, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, [], 0x24}, 0xfffffffffffffff8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000002c0), r3}}, 0x18) 11:48:57 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r4, 0xf9, 0xdc, 0x4, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) 11:48:58 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket(0x11, 0x800, 0x2) r2 = dup3(r1, r0, 0x80000) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) connect$vsock_dgram(r1, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000100)=r3) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r4 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x4, 0x7, 0xd5, 0x400, 0x0, 0x6, 0x40000, 0x2, 0x0, 0x1, 0x9cd, 0x5, 0x1, 0x1, 0x6, 0xfffffffffffffff8, 0x2, 0x5, 0x80, 0x0, 0xfffffffffffff041, 0x4, 0x3, 0xfffffffffffff800, 0x200, 0x10000, 0x7, 0xb8, 0x8, 0x3d9, 0x8, 0x7, 0x41c, 0x7fffffff, 0xfc3, 0x40, 0x0, 0x8, 0x5, @perf_config_ext={0xfffffffffffffffa, 0x54c8222e}, 0x20000, 0x7, 0x9, 0xf, 0xffffffffffffffe1, 0x7ff}, r4, 0x7, r3, 0x2) 11:48:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:58 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r4, 0xf9, 0xdc, 0x4, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) 11:48:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000740)='net/dev\x00') mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) pread64(r1, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)={0x0, [0x0, 0x0, 0x6800000000000000]}) dup2(0xffffffffffffffff, r1) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) 11:48:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 479.195603] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:48:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:48:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:58 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0xf9, 0xdc, 0x4, 0x7fffffff, 0x1}, &(0x7f0000000140)=0x14) 11:48:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0xfffffffffffffffe, 0xfffffffffffffffc) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffff84}, [@ldst={0x7, 0x1ce2ff, 0x0, 0x1c10a1, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x265, &(0x7f000000cf3d)=""/195}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000500)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000480)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2b4, r2, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf640}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffe0}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x128, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9df, @empty, 0x7f}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7fffffff, @empty, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xed, @loopback, 0xdcb2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @local, 0x2a}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000540)={0x2, &(0x7f00000004c0), 0x8, r0, 0x4}) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x41a0ae8d, &(0x7f0000000140)) 11:48:58 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 479.480580] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:48:58 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:58 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:58 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:48:59 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x80800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r1, 0x0) 11:48:59 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:59 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x80800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:48:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r1, 0x0) 11:48:59 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x80800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r1, 0x0) 11:48:59 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 480.517121] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:48:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:48:59 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:48:59 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:48:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 480.726671] FAULT_INJECTION: forcing a failure. [ 480.726671] name failslab, interval 1, probability 0, space 0, times 1 [ 480.763902] CPU: 1 PID: 22469 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 480.764639] net_ratelimit: 22 callbacks suppressed [ 480.764646] protocol 88fb is buggy, dev hsr_slave_0 [ 480.770883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.775888] protocol 88fb is buggy, dev hsr_slave_1 [ 480.780800] Call Trace: [ 480.797839] dump_stack+0x172/0x1f0 [ 480.801528] should_fail.cold+0xa/0x15 [ 480.805443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.810613] ? ___might_sleep+0x163/0x280 [ 480.814810] __should_failslab+0x121/0x190 [ 480.819107] should_failslab+0x9/0x14 11:49:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) [ 480.822949] kmem_cache_alloc_node+0x264/0x710 [ 480.827558] ? mutex_trylock+0x1e0/0x1e0 [ 480.831651] __alloc_skb+0xd5/0x5e0 [ 480.835299] ? skb_trim+0x190/0x190 [ 480.838956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 480.844536] ? __check_object_size+0x3d/0x42f [ 480.849112] netlink_dump+0x724/0xfb0 [ 480.852960] ? refcount_dec_not_one+0x1f0/0x1f0 [ 480.857644] ? netlink_broadcast+0x50/0x50 [ 480.861896] ? refcount_dec_and_test_checked+0x1b/0x20 [ 480.867180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 480.872723] ? consume_skb+0xef/0x380 11:49:00 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:00 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 480.876543] netlink_recvmsg+0xb9f/0xf10 [ 480.880621] ? netlink_dump+0xfb0/0xfb0 [ 480.884599] ? _copy_from_user+0xdd/0x150 [ 480.888800] ? copy_msghdr_from_user+0x2d0/0x430 [ 480.893631] ? security_socket_recvmsg+0x9b/0xd0 [ 480.898402] ? netlink_dump+0xfb0/0xfb0 [ 480.902393] sock_recvmsg+0xd0/0x110 [ 480.902419] ? __sock_recv_ts_and_drops+0x590/0x590 [ 480.902435] ___sys_recvmsg+0x273/0x5a0 [ 480.915123] ? ___sys_sendmsg+0x930/0x930 [ 480.919296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.924847] ? kasan_check_read+0x11/0x20 [ 480.924908] ? __fget+0x367/0x540 [ 480.924929] ? ksys_dup3+0x3e0/0x3e0 [ 480.924958] ? trace_hardirqs_on_caller+0x6a/0x220 [ 480.936418] ? __fget_light+0x1a9/0x230 [ 480.936437] ? __fdget+0x1b/0x20 [ 480.936452] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 480.936470] do_recvmmsg+0x27e/0x7a0 [ 480.957982] ? ___sys_recvmsg+0x5a0/0x5a0 [ 480.962153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 480.967702] ? _copy_from_user+0xdd/0x150 [ 480.971883] __sys_recvmmsg+0xe5/0x270 11:49:00 executing program 0: r0 = userfaultfd(0x80800) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 480.975783] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 480.980128] __x64_sys_recvmmsg+0xe6/0x140 [ 480.984434] do_syscall_64+0x103/0x610 [ 480.988376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.993584] RIP: 0033:0x457f29 [ 480.996784] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.015694] RSP: 002b:00007f3ba4b5ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 11:49:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:00 executing program 0: r0 = userfaultfd(0x80800) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 481.023419] RAX: ffffffffffffffda RBX: 00007f3ba4b5ec90 RCX: 0000000000457f29 [ 481.030700] RDX: 0400000000000160 RSI: 0000000020001cc0 RDI: 0000000000000004 [ 481.037976] RBP: 000000000073bf00 R08: 0000000020001540 R09: 0000000000000000 [ 481.045282] R10: 0000000000010102 R11: 0000000000000246 R12: 00007f3ba4b5f6d4 [ 481.052557] R13: 00000000004c4c3e R14: 00000000004d8748 R15: 0000000000000005 11:49:00 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 481.164641] protocol 88fb is buggy, dev hsr_slave_0 [ 481.169758] protocol 88fb is buggy, dev hsr_slave_1 11:49:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:00 executing program 0: r0 = userfaultfd(0x80800) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 481.313750] FAULT_INJECTION: forcing a failure. [ 481.313750] name failslab, interval 1, probability 0, space 0, times 0 [ 481.352654] CPU: 0 PID: 22510 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 481.359617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.368972] Call Trace: [ 481.371579] dump_stack+0x172/0x1f0 [ 481.375227] should_fail.cold+0xa/0x15 [ 481.379133] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.384261] ? ___might_sleep+0x163/0x280 [ 481.388434] __should_failslab+0x121/0x190 [ 481.392685] should_failslab+0x9/0x14 [ 481.396500] kmem_cache_alloc_node_trace+0x270/0x720 [ 481.401636] __kmalloc_node_track_caller+0x3d/0x70 [ 481.406580] __kmalloc_reserve.isra.0+0x40/0xf0 [ 481.411264] __alloc_skb+0x10b/0x5e0 [ 481.414985] ? skb_trim+0x190/0x190 [ 481.418618] ? retint_kernel+0x2d/0x2d [ 481.422539] ? trace_hardirqs_on_caller+0x6a/0x220 [ 481.427475] ? __check_object_size+0x3d/0x42f [ 481.427500] netlink_dump+0x724/0xfb0 [ 481.427522] ? netlink_broadcast+0x50/0x50 [ 481.440040] ? consume_skb+0xef/0x380 [ 481.440059] ? skb_free_datagram+0x5c/0x100 [ 481.440080] netlink_recvmsg+0xb9f/0xf10 [ 481.440101] ? netlink_dump+0xfb0/0xfb0 [ 481.452253] ? _copy_from_user+0xdd/0x150 11:49:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 481.452275] ? copy_msghdr_from_user+0x2d0/0x430 [ 481.452302] ? security_socket_recvmsg+0x9b/0xd0 [ 481.452320] ? netlink_dump+0xfb0/0xfb0 [ 481.460438] sock_recvmsg+0xd0/0x110 [ 481.477596] ? __sock_recv_ts_and_drops+0x590/0x590 [ 481.482626] ___sys_recvmsg+0x273/0x5a0 [ 481.486621] ? ___sys_sendmsg+0x930/0x930 [ 481.490789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.496372] ? kasan_check_read+0x11/0x20 [ 481.500552] ? __fget+0x367/0x540 [ 481.504024] ? ksys_dup3+0x3e0/0x3e0 [ 481.507749] ? trace_hardirqs_on_caller+0x6a/0x220 [ 481.512693] ? __fget_light+0x1a9/0x230 [ 481.516654] ? __fdget+0x1b/0x20 [ 481.520005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.525538] do_recvmmsg+0x27e/0x7a0 [ 481.529243] ? ___sys_recvmsg+0x5a0/0x5a0 [ 481.533397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 481.538174] __sys_recvmmsg+0xe5/0x270 [ 481.542050] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 481.546358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 481.551098] ? do_syscall_64+0x26/0x610 [ 481.555059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.560425] ? do_syscall_64+0x26/0x610 [ 481.564401] __x64_sys_recvmmsg+0xe6/0x140 [ 481.568638] do_syscall_64+0x103/0x610 [ 481.572513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.577688] RIP: 0033:0x457f29 [ 481.580868] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.599752] RSP: 002b:00007f3ba4b5ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 481.607446] RAX: ffffffffffffffda RBX: 00007f3ba4b5ec90 RCX: 0000000000457f29 11:49:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) 11:49:00 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 481.614703] RDX: 0400000000000160 RSI: 0000000020001cc0 RDI: 0000000000000004 [ 481.621959] RBP: 000000000073bf00 R08: 0000000020001540 R09: 0000000000000000 [ 481.629216] R10: 0000000000010102 R11: 0000000000000246 R12: 00007f3ba4b5f6d4 [ 481.636488] R13: 00000000004c4c3e R14: 00000000004d8748 R15: 0000000000000005 11:49:00 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:01 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = userfaultfd(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x2, 0x0) [ 481.828690] FAULT_INJECTION: forcing a failure. [ 481.828690] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 481.840529] CPU: 1 PID: 22539 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 481.847462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.856839] Call Trace: [ 481.859451] dump_stack+0x172/0x1f0 [ 481.863102] should_fail.cold+0xa/0x15 [ 481.867012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.872176] ? __lock_acquire+0x548/0x3fb0 [ 481.876444] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 481.881556] ? kasan_slab_alloc+0xf/0x20 [ 481.885622] ? kmem_cache_alloc_node+0x131/0x710 [ 481.890381] ? __alloc_skb+0xd5/0x5e0 [ 481.894307] should_fail_alloc_page+0x50/0x60 [ 481.898817] __alloc_pages_nodemask+0x1a1/0x7e0 [ 481.903504] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 481.908550] ? find_held_lock+0x35/0x130 [ 481.912651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.917770] cache_grow_begin+0x9c/0x860 [ 481.921841] ? __kmalloc_node_track_caller+0x3d/0x70 11:49:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 481.927123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.932679] kmem_cache_alloc_node_trace+0x658/0x720 [ 481.937820] __kmalloc_node_track_caller+0x3d/0x70 [ 481.942767] __kmalloc_reserve.isra.0+0x40/0xf0 [ 481.947455] __alloc_skb+0x10b/0x5e0 [ 481.951184] ? skb_trim+0x190/0x190 [ 481.954824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.960370] ? __check_object_size+0x3d/0x42f [ 481.964892] netlink_dump+0x724/0xfb0 [ 481.968705] ? refcount_dec_not_one+0x1f0/0x1f0 [ 481.973387] ? netlink_broadcast+0x50/0x50 11:49:01 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = userfaultfd(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 481.977646] ? refcount_dec_and_test_checked+0x1b/0x20 [ 481.982928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 481.988474] ? consume_skb+0xef/0x380 [ 481.992296] netlink_recvmsg+0xb9f/0xf10 [ 481.996377] ? netlink_dump+0xfb0/0xfb0 [ 482.000373] ? _copy_from_user+0xdd/0x150 [ 482.004552] ? copy_msghdr_from_user+0x2d0/0x430 [ 482.004580] ? security_socket_recvmsg+0x9b/0xd0 [ 482.004597] ? netlink_dump+0xfb0/0xfb0 [ 482.004612] sock_recvmsg+0xd0/0x110 [ 482.004627] ? __sock_recv_ts_and_drops+0x590/0x590 [ 482.004644] ___sys_recvmsg+0x273/0x5a0 [ 482.004667] ? ___sys_sendmsg+0x930/0x930 [ 482.004687] ? __fget+0x340/0x540 [ 482.018145] ? __fget+0x367/0x540 [ 482.018166] ? ksys_dup3+0x3e0/0x3e0 [ 482.018182] ? kasan_check_read+0x11/0x20 [ 482.018205] ? __fget_light+0x1a9/0x230 [ 482.053732] ? __fdget+0x1b/0x20 [ 482.057114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 482.063125] do_recvmmsg+0x27e/0x7a0 [ 482.066853] ? ___sys_recvmsg+0x5a0/0x5a0 [ 482.071022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 11:49:01 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = userfaultfd(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 482.076565] ? _copy_from_user+0xdd/0x150 [ 482.080735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.085509] __sys_recvmmsg+0xe5/0x270 [ 482.089489] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 482.093833] __x64_sys_recvmmsg+0xe6/0x140 [ 482.098077] do_syscall_64+0x103/0x610 [ 482.101978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.107169] RIP: 0033:0x457f29 [ 482.110367] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.129274] RSP: 002b:00007f3ba4b5ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 482.129290] RAX: ffffffffffffffda RBX: 00007f3ba4b5ec90 RCX: 0000000000457f29 [ 482.129299] RDX: 0400000000000160 RSI: 0000000020001cc0 RDI: 0000000000000004 [ 482.129307] RBP: 000000000073bf00 R08: 0000000020001540 R09: 0000000000000000 [ 482.129316] R10: 0000000000010102 R11: 0000000000000246 R12: 00007f3ba4b5f6d4 [ 482.129325] R13: 00000000004c4c3e R14: 00000000004d8748 R15: 0000000000000005 [ 482.130085] protocol 88fb is buggy, dev hsr_slave_0 [ 482.166895] protocol 88fb is buggy, dev hsr_slave_1 11:49:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) [ 482.204632] protocol 88fb is buggy, dev hsr_slave_0 [ 482.209774] protocol 88fb is buggy, dev hsr_slave_1 11:49:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:01 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:01 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x5421, 0x0) 11:49:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:01 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) [ 482.444629] protocol 88fb is buggy, dev hsr_slave_0 [ 482.449724] protocol 88fb is buggy, dev hsr_slave_1 11:49:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 482.496146] FAULT_INJECTION: forcing a failure. [ 482.496146] name failslab, interval 1, probability 0, space 0, times 0 [ 482.524767] CPU: 0 PID: 22581 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 482.531726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.541081] Call Trace: [ 482.543720] dump_stack+0x172/0x1f0 [ 482.547371] should_fail.cold+0xa/0x15 [ 482.551283] ? lockdep_hardirqs_on+0x418/0x5d0 [ 482.555888] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.561012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.565801] __should_failslab+0x121/0x190 [ 482.570051] should_failslab+0x9/0x14 [ 482.573863] kmem_cache_alloc+0x47/0x6f0 [ 482.577939] ? skb_clone+0x26/0x3b0 [ 482.581580] skb_clone+0x150/0x3b0 [ 482.585138] netlink_deliver_tap+0x95c/0xc00 [ 482.585164] ? wait_for_completion+0x440/0x440 [ 482.585188] __netlink_sendskb+0x63/0xd0 [ 482.585205] netlink_dump+0x74e/0xfb0 [ 482.585224] ? netlink_broadcast+0x50/0x50 [ 482.594205] ? refcount_dec_and_test_checked+0x1b/0x20 [ 482.611518] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 482.617065] ? consume_skb+0xef/0x380 [ 482.620884] netlink_recvmsg+0xb9f/0xf10 [ 482.624968] ? netlink_dump+0xfb0/0xfb0 [ 482.628948] ? _copy_from_user+0xdd/0x150 [ 482.628970] ? copy_msghdr_from_user+0x2d0/0x430 [ 482.628996] ? security_socket_recvmsg+0x9b/0xd0 [ 482.629013] ? netlink_dump+0xfb0/0xfb0 [ 482.637899] sock_recvmsg+0xd0/0x110 [ 482.637915] ? __sock_recv_ts_and_drops+0x590/0x590 [ 482.637932] ___sys_recvmsg+0x273/0x5a0 [ 482.637956] ? ___sys_sendmsg+0x930/0x930 [ 482.663476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.669032] ? kasan_check_read+0x11/0x20 [ 482.673197] ? __fget+0x367/0x540 [ 482.676670] ? ksys_dup3+0x3e0/0x3e0 [ 482.680397] ? kasan_check_read+0x11/0x20 [ 482.684575] ? __fget_light+0x1a9/0x230 [ 482.688564] ? __fdget+0x1b/0x20 [ 482.691935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 482.697481] do_recvmmsg+0x27e/0x7a0 [ 482.701208] ? ___sys_recvmsg+0x5a0/0x5a0 [ 482.705375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 482.710927] ? _copy_from_user+0xdd/0x150 [ 482.715095] ? trace_hardirqs_on_caller+0x6a/0x220 [ 482.715118] __sys_recvmmsg+0xe5/0x270 [ 482.723930] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 482.728270] __x64_sys_recvmmsg+0xe6/0x140 [ 482.728292] do_syscall_64+0x103/0x610 [ 482.728314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.728329] RIP: 0033:0x457f29 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x4008000, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 482.744811] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.763720] RSP: 002b:00007f3ba4b5ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 482.771440] RAX: ffffffffffffffda RBX: 00007f3ba4b5ec90 RCX: 0000000000457f29 [ 482.778707] RDX: 0400000000000160 RSI: 0000000020001cc0 RDI: 0000000000000004 [ 482.778717] RBP: 000000000073bf00 R08: 0000000020001540 R09: 0000000000000000 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r2, 0x0) [ 482.778726] R10: 0000000000010102 R11: 0000000000000246 R12: 00007f3ba4b5f6d4 [ 482.778735] R13: 00000000004c4c3e R14: 00000000004d8748 R15: 0000000000000005 11:49:02 executing program 1 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x5450, 0x0) 11:49:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x4008000, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x4008000, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x5451, 0x0) 11:49:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r2, 0x0) 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x10001}, &(0x7f00000000c0)=0xc) 11:49:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x0, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x40000000000000c, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x5452, 0x0) 11:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x0, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:02 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, &(0x7f00000000c0)) 11:49:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x40000000000010c, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x0, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(0xffffffffffffffff, r2, 0x0) 11:49:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x5460, 0x0) 11:49:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000ec0, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:03 executing program 0 (fault-call:3 fault-nth:0): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10110, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40044581, 0x0) 11:49:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x104, 0x10, 0x0, 0x0) 11:49:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40044590, 0x0) 11:49:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x200002) 11:49:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xfffffffffffffffc) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) r1 = gettid() ptrace$peekuser(0x3, r1, 0x6) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) 11:49:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:03 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') r1 = socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000440)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000000500)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000600)='net/stat\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b8000/0x3000)=nil, 0x3000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x0, 0x9, 0x3, 0x1800000000000000}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f000060b000/0x1000)=nil, 0x1000, 0x1000008, 0x33, r2, 0x0) unshare(0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000000c0)) r6 = open$dir(&(0x7f0000000400)='./file0\x00', 0x80004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x0, 0x7fffffffe, &(0x7f0000000200)={0xffffffffffffffff}) r8 = openat$cgroup_ro(r7, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r8) getsockopt$inet_tcp_buf(r8, 0x6, 0x25, &(0x7f0000000b00)=""/4096, &(0x7f0000000240)=0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) pwrite64(r6, &(0x7f0000000340)="4bf2382b49e1ef7db15e", 0xa, 0x0) r10 = creat(&(0x7f00000005c0)='./file0\x00', 0x42) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7e) ftruncate(r10, 0x2008200) open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) 11:49:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40044591, 0x0) 11:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 11:49:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 484.769870] device lo entered promiscuous mode 11:49:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 11:49:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x400445a0, 0x0) 11:49:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000102000000040000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 485.580147] audit: type=1804 audit(1552045744.847:279): pid=23114 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir753314710/syzkaller.JYAQ82/603/file0" dev="sda1" ino=17793 res=1 [ 485.595125] Y­4`Ò˜: renamed from lo [ 485.730834] audit: type=1804 audit(1552045744.997:280): pid=23124 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir753314710/syzkaller.JYAQ82/603/file0" dev="sda1" ino=17793 res=1 11:49:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 11:49:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:05 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x801, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20040094) 11:49:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{}]}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40049409, 0x0) 11:49:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) dup3(0xffffffffffffffff, r1, 0x0) 11:49:05 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80400, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x1a8, 0x3f, 0x6, 0x70bd26, 0x25dfdbfc, {0x19}, [@generic="380f8ec8e252baf03487cc3192edc0d83ed6c43da9ea1c1999eea10595866d09ca854fc5bbc34de2e0a533128fab24da233c7613eebf74bcb0ba4d01d79073c499c05f8e5052594e5d56b6ef7f9f09bda21f31d104c69fc068ca32427ea01b1ce9c30fc944db5c4a8022bee32df67112d11582ebca4f7f008da0533a429d6d9a5a3ed073abfedf7e86f7dfa2", @typed={0x14, 0x3d, @ipv6=@loopback}, @generic="46825ca612650a32bcc8c0a7147470b06165b13d6bdf00c34bb55c4d51b2aa4a8b6f2f4144c689a4339e5b9b1a35b14123e2e9137f7e175718bdfec97cd0c6d760953886f9583fbb0c30cb84d8db0310d0c493867d04222a49302f8f854718357a8d518b7c0b30b13d4c2a91bbf1cfb6cd674c0fe2ba64731bdf852cc3053eca60bf8ffadf39a7c1ee0c62964da3c47b2d258fcc011e954fab50136baa68830222de3fbdf610b3553500d6aa0fbc5f5f95542e694c0039dd73ce451d4344f8e4bbe300e0fe29b3466d5826898d532548a7ed07b4def9da5b5661ae6a17110ccd4c9a6c8b2fd9544ab655a23bc34919dfc7a8d1", @generic]}, 0x1a8}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) connect$bt_rfcomm(r2, &(0x7f00000002c0)={0x1f, {0x7, 0x8000, 0xfffffffffffff426, 0x6, 0x1f, 0x5}, 0x3037}, 0xa) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:05 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) recvmmsg(r1, &(0x7f0000000500)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/250, 0xfa}, {&(0x7f0000000400)=""/218, 0xda}, {&(0x7f0000000140)=""/124, 0x7c}, {&(0x7f0000000000)=""/27, 0x1b}], 0x4, &(0x7f0000000340)=""/106, 0x6a}, 0x59}], 0x1, 0x2020, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006900)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) bind$xdp(r1, &(0x7f0000006a40)={0x2c, 0x4, r2, 0x30, r1}, 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vcs\x00', 0x8000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000600)={0x0, 0x0, [], @raw_data=[0x3, 0x7, 0x0, 0x4, 0x10001, 0x0, 0x3ff, 0x1, 0x6, 0x100000000, 0x6, 0x3, 0x7, 0x6, 0x101, 0x6, 0x6, 0x9, 0x3f, 0x4, 0x80, 0x89c0, 0xeb59, 0x100, 0x1, 0x8, 0x7f, 0x1, 0x9, 0x3a1, 0x7, 0x22]}) write$input_event(r3, &(0x7f00000006c0)={{0x77359400}, 0x15, 0x100, 0xd2}, 0x18) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000580)=0x2) 11:49:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40084503, 0x0) 11:49:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) dup3(0xffffffffffffffff, r1, 0x0) [ 486.284661] net_ratelimit: 18 callbacks suppressed [ 486.284670] protocol 88fb is buggy, dev hsr_slave_0 [ 486.294762] protocol 88fb is buggy, dev hsr_slave_1 11:49:05 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) r2 = userfaultfd(0x0) r3 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 486.364657] protocol 88fb is buggy, dev hsr_slave_0 [ 486.369754] protocol 88fb is buggy, dev hsr_slave_1 11:49:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) dup3(0xffffffffffffffff, r1, 0x0) 11:49:05 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x400) 11:49:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40084504, 0x0) 11:49:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x100, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0xfffffffffffffeff}, 0x2) getpeername$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) clock_gettime(0x200, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000000000000000000000400000000fd1200f4abd86e4654fdcd631fcc57e0e634a95570d00e0a337fcf15238c9cb3869fe944e6ca74e4c71262f61368d37d8f4ebd32be8e7ffb8ab7c5f74fddb1b1ad5a65e8e72f503dd91cbcac90f8523aba75ed09b9b187a3555909f8583b36580fd12a98857da8c37ea841470073977b"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 486.604632] protocol 88fb is buggy, dev hsr_slave_0 [ 486.609767] protocol 88fb is buggy, dev hsr_slave_1 11:49:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 486.684637] protocol 88fb is buggy, dev hsr_slave_0 [ 486.689762] protocol 88fb is buggy, dev hsr_slave_1 11:49:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:06 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r1, 0x800000000000000, r0) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000000)={'bond_slave_1\x00', 0x99, 0x8}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) fcntl$getown(r1, 0x9) 11:49:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:06 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet6_buf(r2, 0x29, 0x45, &(0x7f0000000000)=""/23, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40104593, 0x0) 11:49:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 487.004663] protocol 88fb is buggy, dev hsr_slave_0 [ 487.009790] protocol 88fb is buggy, dev hsr_slave_1 11:49:06 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000240)=0x6) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000280)) r3 = userfaultfd(0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xe7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e21, 0xfff, @dev={0xfe, 0x80, [], 0xb}, 0x101}}, 0x0, 0x4a5, 0x7, 0xff, 0xffffffffffff0001}, &(0x7f00000001c0)=0x98) r6 = fcntl$dupfd(r2, 0x0, r3) setsockopt$rose(r2, 0x104, 0x3, &(0x7f0000000000)=0x100000000000000, 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, 0x0, 0x0) 11:49:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x4020940d, 0x0) 11:49:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:06 executing program 0: mlockall(0x4) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) syncfs(r0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x100, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0xfffffffffffffeff}, 0x2) getpeername$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) clock_gettime(0x200, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000000000000000000000400000000fd1200f4abd86e4654fdcd631fcc57e0e634a95570d00e0a337fcf15238c9cb3869fe944e6ca74e4c71262f61368d37d8f4ebd32be8e7ffb8ab7c5f74fddb1b1ad5a65e8e72f503dd91cbcac90f8523aba75ed09b9b187a3555909f8583b36580fd12a98857da8c37ea841470073977b"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x40284504, 0x0) 11:49:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0xfffffffffffffffd, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x80000) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000000)=0x3, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:07 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vfio/vfio\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000ec0)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r2 = dup2(r1, r1) write$vhci(r0, &(0x7f0000000940)=@HCI_VENDOR_PKT, 0x2) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x5, 0x4, 0x5, 0x1, 0x6, 0x1, 0x81, {0x0, @in6={{0xa, 0x4e22, 0x80000000, @remote, 0x7}}, 0x2, 0x6, 0x2, 0x240000000000, 0x100000000}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000f00)={r4, 0xe9, "cec054d065bf13392e8feab9a83ba38c339cf0240e3f51d0a4c3bc456b1169811964902eed9245e4b473d669a9cc1e452cd9790d0cf4eb5b1087716f06d8a5b32c86eb4f29822ae222318e8fdfc9a36ac0a2dfc9655e91dacf305d29bad82923678fd700f75359fcd981e8285e26d9c9df1b379a4be139664a01a45c6ca6add35c50bebceeaf90872c1b08bcb1990af10cf8f88559c59c64adaae413a70e009895f7aa2d9c08c62d00e2d44eef7e1c5a9e08ee8a88c56b812e1c7e97a8555cafb94e351b4361ed041e5d75a62a0e90463d40f50428311d7b880136092c1721348d39d7a94d8496eaa3"}, &(0x7f0000001000)=0xf1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000900)={@mcast1, 0x7, 0x0, 0x0, 0xb, 0x3, 0x3}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000ac0)={0x0, @in={{0x2, 0x4e24, @broadcast}}, [0xe0000000, 0x1000, 0x9, 0x5, 0x10001, 0x1ff, 0x2, 0x7, 0x5, 0x8, 0x3, 0xfffffffffffffffc, 0x80000000, 0x6, 0x44]}, &(0x7f0000000bc0)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000c80)={0x0, 0x64, &(0x7f0000000c00)=[@in6={0xa, 0x4e24, 0x1, @empty, 0x7fff}, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x7fff}, @in={0x2, 0x4e21, @rand_addr=0x7e7}, @in6={0xa, 0x4e23, 0x2, @rand_addr="0fc520c69ac142009b18344fc6e31dba", 0xff}]}, &(0x7f0000000cc0)=0x10) sendmmsg$inet_sctp(r2, &(0x7f0000000dc0)=[{&(0x7f0000000000)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="8817e95b2dc674b89b8fa4df1f5602dc41b266bdab3c02caaf74989c50b1d52f9ad322774a", 0x25}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000084000000070000000000000000000000180000000000000084000000000000000100ff070400c1ff180000000000000084000000050000003000000007000000180000000000000084000000060000000200000000000000180000000000000084000000060000002201000000000000300000000000000084000000010000000200020000800000400000004af801ff0900000006000000270a0000", @ANYRES32=r3, @ANYBLOB="2000000000000000840000000800000000000000000000000000000000000001"], 0xc8, 0x4800}, {&(0x7f00000002c0)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000300)="4c1d73d9234843670b63e239f68118cda8f189003378c84fa0c7f358be873efcfd4023d8f383cb5ca2e4b056b880da459bc3082cdbb28faf496fae4fa0cacb86a3d4a884d589094d89148baa908fd4d870479a9b80addb497390fc4bd35608ac62a9ffd825c22950c1e86445cf130c610216cde6cff90c687f04fdc6a4a9fd340147ca3ebe8f073d8e0f07624f6cb71e9d1a49317c07374e19cb980c13aecf378464beba9c6f93618af6d7aaa3ccf196", 0xb0}, {&(0x7f00000003c0)="b159cf23f50c3d21a5b1b8f03248d6027c42afd63d6a46c99e5ff1b777e54182d6a3285c2f2c60043a2073bfdd4f799bb56597f16db063080a5a5a6c8d0695c849b8c14b17036f7cf0ef", 0x4a}, {&(0x7f0000000440)="02c0e1f08506461f3a1785ee966f4b3300008895f45cc1bdebb71b1aa8a740a095832c8615c5b8e570c92b528b4f1fb3501b4f02661bdffe28054ed963940acf04cc0b5d7849b32b2e21bf80945006425390e4061abb074a47ffaa63a841c50d667fc81205a536f333cebec2bf8cf1985042c855da0103dcb67f94a1489ac280f99e667fbcfe94df8bf64eb1a4ecb5e7c79725dcbbf09b614d91510f69b0e08a0f1c0fdb800bf9eecea73bf5c1de7b", 0xaf}, {&(0x7f0000000500)="550fee0c731d6f1725d5368e66edfd1755b97d6e0d152311d59204a8a8872f55ff60", 0x22}, {&(0x7f0000000540)="2fb7cb67e49becac448d70bb24bfdca005e2edbf2cec4507c667904226b077f41b8ddae6a63b733bba158aac4891030dd8829a6fa5904e558002907f79becedfdd57d7d48a31bbc1b5138b436f8b56502c6b3678987e87e53824b8e64f55912785dfacece4a3a2bdbd6a432004f1b140e723cd9f026caa222d9bf778d262b12ea3678462985f86005360c669074f5e2313ae2a38a1e4c00f6efef080fb8acdf5d7bb26277c4afe88efd8741abcd8a55da6c067d64c2222df5e4402cb42324baedd4f3946ef7b707259bb6f1cfb65c43d2476d83ce29e3d8850d1aab78f885c556c7fcaf30e4cca8bde1dbffa7bd1185d3505d35cf4e842f068", 0xf9}, {&(0x7f0000000640)="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", 0xfe}, {&(0x7f0000000740)="7cd5f414b59a75a48eabc3e9076b4aba234769628468d27c66f1e8a341f5d650ae8b335a1a91ce976731dd1b666eb2214225e6f9610b71bcb155303dae803539eb0a614896363abb19d91a078cc619b97425ca1c2bec3644c90708b0f45665d79222c4c3168a051020292dbf17b2ba21c339ed686a4c9b5dde1304ccc5f4e61fc3da628cb2cf8ef2b97aca454eff7b1edcd3154bdec5454edd33725cb56df6a6cbb88628408f77a4b4ca60cd8c9758e7b4b43d87454362c3692e5d865cd87bcc27e8c792138cca1c558a271c1c2b2c6832189fc7", 0xd4}, {&(0x7f0000000840)="ade4035a8cdba322c2f5ba89de6162a819", 0x11}], 0x8, &(0x7f0000001180)=ANY=[@ANYBLOB="1800002400000000840000000000000000200042000000000084f7ff0008000000fe8000000000000000000000000000bb180000000000001e8400000005f4ffff1f0000000100010000000000000000e32234221bcfaf1436756a"], 0x50, 0x800}, {&(0x7f0000000980)=@in6={0xa, 0x4e20, 0x4, @empty, 0x80000001}, 0x1c, &(0x7f0000000a80)=[{&(0x7f00000009c0)="06d225b99bca584decd94aa4135df13b15ecb0aa3356736cd5f081afc51efe3b7e979165c4551abd863c344efda8fb0652493f671cf22a23fd0a411ed28aebcc434cb2e43d03667245a5b1d8aa881454a99faa0482444156632b738c96b8eae618eff3bee4651f76195b9f2ef110d37c639c5973f1365a0120c4f03b", 0x7c}, {&(0x7f0000000a40)="93d3d5ee2c", 0x5}], 0x2, &(0x7f0000000d00)=[@dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @init={0x18, 0x84, 0x0, {0x247, 0x10000, 0x7, 0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x10001, 0x3, 0x8b, 0x800, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x21}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x2, 0x400, 0x80000000, r6}}], 0xc0, 0x40000}], 0x3, 0x0) r7 = userfaultfd(0x0) r8 = fcntl$dupfd(r1, 0x0, r7) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000001140)={&(0x7f0000001040)=@ethernet={0x306}, 0x80, &(0x7f0000001100)=[{&(0x7f00000010c0)="a545b59b381a963606f7ec7d4dbd3e469fa1f0de31e36c58bb779eb2d2fec152", 0x20}], 0x1}, 0x8000) 11:49:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) getpeername$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8, 0xff, 0x1}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r1, 0xa, 0x3}, 0x8) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x400, 0x2502) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xd0541, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x3, 0x19, 0x1, r3}) r4 = fcntl$dupfd(r0, 0x3ffc, r1) getdents64(r3, &(0x7f00000000c0)=""/254, 0x3e4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_buf(r2, 0x0, 0x33, &(0x7f00000001c0)=""/129, &(0x7f0000000280)=0x81) 11:49:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x6, 0x80000001, 0x6, 0x2}, 0x6) 11:49:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044584, 0x0) 11:49:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:08 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) chroot(0xfffffffffffffffd) pipe2$9p(&(0x7f0000000080), 0x80800) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 11:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80084502, 0x0) 11:49:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000000)=""/159) 11:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80084503, 0x0) 11:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000420001000000550e26afeb19096aada3b904c000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @broadcast}], 0x10) 11:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80084504, 0x0) 11:49:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x3ffffffffffff0c, 0x22, &(0x7f0000001540)={0x0, 0x989680}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000003ac0)=[{{&(0x7f00000000c0)=@ipx, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/206, 0xce}], 0x1}, 0x3}, {{&(0x7f0000000140)=@l2, 0x80, &(0x7f0000001680)=[{&(0x7f0000000400)=""/204, 0xcc}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001580)=""/204, 0xcc}, {&(0x7f00000001c0)=""/16, 0x10}], 0x5, &(0x7f0000001700)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000002700)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/251, 0xfb}, {&(0x7f0000003880)=""/219, 0xdb}], 0x3}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000003980)=""/245, 0xf5}], 0x1}, 0x7f}], 0x4, 0x10102, &(0x7f0000001540)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003bc0)=ANY=[@ANYBLOB="140000004200010200000000000000000000d80d9a7d102966afd3b37b14ccc73e0000633e"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80104592, 0x0) 11:49:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:09 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x80800) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) r3 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='cpusetposix_acl_access)system%system)*$security\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="829a48541ddcf58074ff71ff2dde05fa979aa064eb89d658a7ce4a843da617457d71ad8d90742b44d3c52274cc76a6c004234eafa154b871b22f9a2f1fd427452f435e08d97270ac95630fb0127e184b86c9c244d031a26f869ef85ae95405605c067c011b", 0x65, r3) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000000)) 11:49:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80284504, 0x0) 11:49:09 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) connect$rxrpc(r3, &(0x7f0000000ac0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @empty, 0xffffffffffff8000}}, 0x24) fstat(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000000c0)=[0x0, 0xee01]) r6 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@loopback, @in=@broadcast}}, {{@in6}}}, &(0x7f0000000a80)=0xe8) getresgid(&(0x7f0000000400), &(0x7f00000003c0)=0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) r12 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000c00)=ANY=[@ANYBLOB="500300000000000003000000000000000500000000000000010000000000000007000000000000000500000000000000010000000800000004000000000000000900000000000000060000000000000000000000100000000500000000000000030000000000000006000000f8ffffff00000000040000003f000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="ffffff7f53bbffff000000000500000000000000ff0000000000000003000000070000002a3a28000000000002000000000000000000000000000000000000000000000008000000000000008b9ece340700000004000000000000008000000000000000001000000000000008000000000000000200000000000000f7ffffffffffffff490a000003000000010000800000000035000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ff070000c52a000000000000050000000000000006000000000000000f000000c6000000757365725e3a707070315c70726f630000000000000000000000000000000000050000000000000006000000000000000700000000000080020000000000000009000000000000000500000000000000410d000000000000000400000000000005000000000000000100000009000000db66000005000000e11a0000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0100000002000000000000000400000000000000ff7f00000000000012000000030000006b657972696e6775736572707070307b2e28000000000000010000000000000002000000000000000600000000000000080000000000000001000000020000000000000000000000070000000000000000040000000000000700000000000000ffffffff00000000ff00000000000000faffffff0500000001080000ffff0000deffffff", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0200000001010000000000000400000000000000040000000000000007000000090000007472757374656400060000000000000001000000000000000101000000000000000000000000000435bc0000030000000000000000000035cb03e33665651c9ef3b4f70008000000000000008100000000ffffffff00000000ffffff7f00000000030000000700000000800000010000007f0000000000000000000000000000", @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="02000000d104000000000000040000000000000000000000000000000c0000000100000070726f63267d47504c5d6c6f00000000"], 0x350) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:09 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x800, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000240)) r3 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x208000) ioctl$int_out(r1, 0x5460, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1f, 0x110001, 0x96, 0xab, 0x2b, 0x1, 0x7}, 0x2c) recvmmsg(r3, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="144fa6cdc1ea71b196822b3c5a080b1fc559160a"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:09 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000040)={{0x71a, 0x101}, 'port0\x00', 0x21, 0x10000, 0xffff, 0x9, 0x7, 0x1, 0x7fffffff, 0x0, 0x5, 0x2}) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0xc0045878, 0x0) 11:49:09 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:09 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)={0x3f, 0xa6, 0xff, 0x3, 0x6, 0x5c}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) delete_module(&(0x7f0000000000)='\x00', 0x0) 11:49:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0xc0045878, 0x0) 11:49:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='\x00', 0xfffffffffffffffa) r1 = request_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='\x00', 0xffffffffffffffff) keyctl$reject(0x13, r0, 0x8, 0x1, r1) r2 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f0000000280)=0x1, 0x9, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x2, 0x0) recvmmsg(r2, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x1, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:10 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000140)=0x66, 0x4) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedsend(r2, &(0x7f0000000040)="6b74aebf89bb207bd92073a6410feb058979", 0x12, 0x3, &(0x7f00000000c0)={r3, r4+10000000}) r5 = userfaultfd(0x0) r6 = fcntl$dupfd(r1, 0x0, r5) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, 0x0, 0x0) 11:49:10 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0xc0189436, 0x0) 11:49:10 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:10 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0xc020660b, 0x0) 11:49:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x400, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0xc0000) timerfd_gettime(r1, &(0x7f00000000c0)) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000102800000000000400000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:10 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x72, 0x7, 0x8, "927b13db920c8fe1480a5e222de33121", "4dc15ca4a6b362742c0088c5a39f1bcd79f7d55dd7dda5f1ef5eebd94da162d6fbefe350c77abe22ad256aaad99d5796f90cf1252f806299d20fbeed5a3e48680b158d8463ae73f7e8b74cd377c92661d2d53ca06ae9f74543cad45aef"}, 0x72, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000000)={0x3, 0x4}) 11:49:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) signalfd(r1, &(0x7f0000000040)={0x9}, 0x8) 11:49:10 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x2, 0x3, 0x7ff, 0x9, 0x3, 0x9, 0x80, 0x4, 0x2, 0x100000001, 0x8, 0x1, 0x2, 0xf107, 0x3ff, 0x6, 0x3, 0x8, 0x7, 0xfffffffffffffffd, 0x8000, 0x7, 0xe5f, 0x3638cb2c, 0x8, 0x2, 0x5, 0x10001, 0x4, 0x2, 0x5b09292e, 0x4]}) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) [ 491.564889] net_ratelimit: 24 callbacks suppressed [ 491.564897] protocol 88fb is buggy, dev hsr_slave_0 [ 491.575182] protocol 88fb is buggy, dev hsr_slave_1 11:49:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 491.691856] Unknown ioctl -1064282524 [ 491.721216] Unknown ioctl -1064282524 11:49:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000102000000000000000000002000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 11:49:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x200, 0x40000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000080)={0x6, 0x4, [0x7]}) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x1) 11:49:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000040)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80044501, 0x0) 11:49:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:11 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000000c0)={0x753f, 'syz0\x00'}) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x40000) 11:49:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100, 0x10080) r2 = fcntl$dupfd(r0, 0xfffffffffffffffe, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") sched_yield() r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xfffffffffffffffb, 0x200) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000080)=0xc32, 0x4) flock(r1, 0xd) open$dir(&(0x7f0000000000)='./file0\x00', 0x200000, 0x106) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") fcntl$getownex(r0, 0x10, &(0x7f0000000100)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x8001, 0x3f, 0xc87, {0x77359400}, 0x6, 0x4}) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000100c30000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20008001) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) [ 492.534627] protocol 88fb is buggy, dev hsr_slave_0 [ 492.539754] protocol 88fb is buggy, dev hsr_slave_1 11:49:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/114, &(0x7f00000000c0)=0x72) 11:49:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 492.604636] protocol 88fb is buggy, dev hsr_slave_0 [ 492.609790] protocol 88fb is buggy, dev hsr_slave_1 11:49:11 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000040)) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000080)=0x18, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) [ 492.706529] IPVS: length: 114 != 8 11:49:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000db0ab36a005960f30000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) [ 492.731933] IPVS: length: 114 != 8 11:49:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000080)={0x0, {0x3, 0x7d7cac3e000}}) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 492.844631] protocol 88fb is buggy, dev hsr_slave_0 [ 492.849732] protocol 88fb is buggy, dev hsr_slave_1 11:49:12 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000001040)) open_by_handle_at(r0, &(0x7f0000000000)={0x1008, 0x3, "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"}, 0x4000) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 492.924629] protocol 88fb is buggy, dev hsr_slave_0 [ 492.929773] protocol 88fb is buggy, dev hsr_slave_1 11:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @loopback}, 0x8) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:12 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x0, 0xd1f8, 0x4, 0x2, 0xffffffffffffff01, 0x6, 0x8c3, {0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x5, 0xe051, 0x5e, 0x9, 0xffffffffffffff01}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x80000000, 0x101}, &(0x7f0000000180)=0x8) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = userfaultfd(0x0) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:12 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x18000, 0x0) pread64(r0, &(0x7f00000000c0)=""/238, 0xee, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x40000) ioctl$EVIOCGBITSND(r0, 0x80404532, 0x0) 11:49:12 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps\x00') ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000140)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, 0x80000000, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000001c0)={{0x5d, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'nq\x00', 0x5, 0x2, 0x42}, {@multicast1, 0x4e23, 0x1, 0x7, 0x401, 0x3f}}, 0x44) getsockname$unix(r3, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000380)={{0x4, 0xffff}, 0x1, 0x6, 0x6, {0x1dc, 0x80000001}, 0x9, 0x81}) r4 = userfaultfd(0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000340)={0xf1, &(0x7f0000000240)="f1ee1f7dec128f5a164c383a8bc30d73f476eba9a0a663c7937a126a03625f3bb726b50007c2c5d7627004a91ab263d69b9539c858b9c06fb532232cd13ce13062518cc9294cd79a3392fec8058a20b02aaca18e787938660576db8208d1388723c0abfdf6a6614e209bc1b3cf12ccc58582571f26fab2aaf15b547e78a4d0e9a717e66e3508f9b75c1a493ed0e9c8937128305edf59b18f49772f31d696da535908cc8bd01120c3f2fcf48f5b7013103049fcce8aead5b6c3357878c90ac0e1142650a125afa934925c23ff49dbd73558d262247d7f6f21a53810470a16cb7508f118747b5184ff7eca17bf4055d436d7"}) r5 = fcntl$dupfd(r0, 0x0, r4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, 0x0, 0x0) 11:49:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x8, 0x800, 0x1ff, 0x4, 0xfffffffffffffffc, 0x87e3}, 0xbc}, 0xa) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x3, &(0x7f0000000100)=0x2) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:12 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000100)=0x3, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x42000, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000140)) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = userfaultfd(0x0) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000000000000006001a0000000100b7983ea406a8dcd326e9ac385261e977bb341fdd93a9a5dfe8dbe80eac984e9d2dfd211bf3fe6a319bd18466d302dd8af7ec372e06b53ab0f730ee9cdc2d02fcbc2ddd4936f0aa701323ea021fa83dea4a9702da48f9bcb6"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0xc6e3) 11:49:12 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000040)={0x3, 0x80c6, [{0x9, 0x0, 0x1}, {0x8e, 0x0, 0x2}, {0x0, 0x0, 0x1}]}) r3 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000040)=""/25) 11:49:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0xe}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000000c0)=""/4096) getsockopt$inet6_int(r0, 0x29, 0x10000000000010, 0x0, &(0x7f0000000040)) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = userfaultfd(0x0) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f00000001c0)=0xfffffffffffffffc) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xff, 0x10000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000080)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 11:49:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a12") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:13 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001040)='/proc/capi/capi20\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001080)={0x0, 0xfffffffffffff002}, &(0x7f0000001240)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001100)={0xffffffffffffffd5, 0x7f, 0x8009, 0x3, 0x4, 0x4, 0x400000000000, 0x200, r1}, &(0x7f0000001140)=0x20) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000000)=""/4096) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001000)={0x0, 0x3, 0x2a}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000001200)=ANY=[@ANYBLOB="010000000000000000200000000000005200000000000000", @ANYPTR=&(0x7f0000001280)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000e6a0000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3300000042000102000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) rt_sigaction(0x3b, &(0x7f00000000c0)={&(0x7f0000000040)="f04118a600800000c4624128fb44dd390f8106000000676f410f60db36450f52bcda001000022e3643d9f98fe97c81b800000000f20f2cba02000000", {0x6}, 0x1, &(0x7f0000000080)="420f925abcc4615fd00745db7ffa40defb26653636266466490f3a16fb00c4e1e173dde5c40101ebf765440feb5c1e0fc443896a3f0fc3"}, &(0x7f0000000180)={&(0x7f0000000100)="990f1f4000400fec84ae45a900008f28409e896556666602460f8600000000c4c1fe703b0d0fae02c4c1f85e09f04380481922c421adee9d26000000", {}, 0x0, &(0x7f0000000140)="642e660f3825b46d030000000f0d3165400fe166bbc4a3096cc400f2436dc4c2a1a7430df342d9d0c423c168e033c482659a3c8ec463217fc700"}, 0x8, &(0x7f00000001c0)) 11:49:14 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) writev(r1, &(0x7f0000001400)=[{&(0x7f0000000000)="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", 0x1000}, {&(0x7f0000001000)="aba5db8ecbebc728616943660d3c9e07ea7ddbcb73f082a1cfe9de7031a24e71cf7e01294da2f8653036f7c342a3184220eb52d519b560e69b948b75eab99d82488dee7a0b338a199dbd0020eac6ae8843f1e05a8bba501df7d7bca68f327e3616499405f3d39474c5f3a8c8bc409dfc26744c15162d7e20b1500341016c29f35cbad6dd442e6510fe89f074b3201f6c4eba914ca748eb70e23da2618b51b598338247bbf989ed6a55f0", 0xaa}, {&(0x7f00000010c0)="3bac79bd0a89bc85c0164f883eeb2142d3bc471161c6ca3c97ce5d55c9024618712efd0611ff14f073c022b094a8b450e09f2c300c5cfe794d6ba8500195bd8204d5eefc4988f7ed1fc2dd2878721b702fabffe55a260db355eab4485e13f99d9c1a83c0820271a6acdc4ca7dab90b9c96f7f14435e9a36a9d38729152556f92eadb63ee417ce68841048d6cbe855157b3e46572be603aecef48800fd8d8560d87ad36d63334d743f4accb04ba42b7bddf95fdc927312c9b87eb9550d0078caad163d1261be1eea314220e85b387d0f551849aff4a5a4a2a03ab9c", 0xdb}, {&(0x7f00000011c0)="15306d227f2853cad7cb26d53696e5706795c16bdeba163433fa5b38bb54fa504384bd55903b26765f06ff20127db5efe7973eca1b547c16f40e87a302d667f32df6f434ee34b74af8", 0x49}, {&(0x7f0000001240)="c6278d94576bb7759dc6e4d2486b50c6f83ed89034407327016bc0171d6e17a9cccffa3c76b3f105be9332834d98369a5b8e15997cb9b922bd7cfb64b8e27eeae7dac80b045417bdd34898d034d6513edad979b7cb9a5f0675633713825db8017bc402f90a0786b40967f2645cfa5ddff53ffd0fa4800609419e9e7a6ae63f485caf4a1b9ec6323159dcb1c2ffc30a1d0d3547214ff45be6807aa5f2a41d1e28bb7f2e40382ff943334f28442f909c7a52457d76ca730d93a486511f74008be94630dae534cfceef6b0c17ced50a554073f496055a2d4349afcf9a70c0ee4b782f9211a1df7603f36cdad02c69329a74e506267eac27343af1", 0xf9}, {&(0x7f0000001340)="2c228ca85452daa8f49a1fe890a80b948f27d64bf850180147788a23c4575831799156c0a836e03a1b85f60b5b83b37c11a75b81ffbddcd617b25f6bc3c91def090eae85229a7a36db4f7601331f43c5a050b0dc40b0dc0f24768215c3e548acc0a79773ee6f812d07ab398c3681c0358dd0c960517c5ac07b0fdc75b153efe9527bbd3a076eb21880d42b05ee9cc5ab2dbf", 0x92}], 0x6) 11:49:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a12") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a12") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:14 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000180)=0x101000) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000140)={0x3, @null, r3}) 11:49:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:14 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffffdd, 0x1ca, 0x8, 0x4, 0xffffffffffffffff, 0x0, 0x4, 0x40008, 0x6, 0x1ff, 0x20, 0x21, 0x6, 0x0, 0xeb, 0x80000000, 0x4, 0x25, 0x1, 0x0, 0x0, 0x7, 0x9, 0x1, 0x800, 0x3, 0x9, 0x6b800000000000, 0x4, 0xfff, 0x400, 0x10001, 0x1, 0x1, 0x0, 0x7, 0x0, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000100), 0x1}, 0x20040, 0x1, 0x3, 0x3, 0x7fff, 0x7, 0x2d0b}, 0x0, 0x7, r0, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x80000000007, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000000540)=0x68) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0x1, &(0x7f0000000580)=0x1) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xc8, r2, 0xc00, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="9023faf4d96256c0d7b6908981f9c665"}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x1) sendmsg$nl_xfrm(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c00000000005f7c0000000000000056606f070f454aa2a92c15d487bbf9fe630aa620cfd90fa1f2846e8e4bd57bf730d896764918f5"], 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x4000) 11:49:14 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x20}, &(0x7f0000000040)=0x8) fsetxattr$security_smack_entry(r2, &(0x7f0000000200)='security.SMACK64MMAP\x00', &(0x7f00000001c0), 0x0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @multicast2}}, 0xecd, 0x7}, 0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x24) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x77a0, 0x9, 0x4e22, 0x6, 0xa, 0xa0, 0xa0, 0x0, r1, r2}, {0x33, 0x4, 0x5, 0x9, 0x6000000000000, 0xfa, 0x0, 0x3}, {0x4, 0x9, 0x2, 0x1ff}, 0x8, 0x6e6bba, 0x2, 0x0, 0x3, 0x1}, {{@in6=@loopback, 0x4d5}, 0xa, @in6=@remote, 0x3506, 0x3, 0x3, 0x3f, 0x8, 0x1, 0xfffffffffffffffc}}, 0xe8) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:14 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000000)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xdc, 0x1, 0x81, 0x8, 0xbe, 0x2, "497604cd44347bdbec20dca8b79118116d90b1c6ffb56e7bd33af7f799dda3a47996304cb8d0736c149b09e4d73c81891519c91c082ed23af6e982e9007d8dacaab9ce59c5c798d0f7b5fe8aac13f9baea7a303ea0b9ed1dec60b162c8e7a61443d155bd07dfa55ad714c324d927092a508a69e4216f4fd4869a11a5dd51724aaca4bb4339a8f825ecd6e0776141b21ce7c5568c4f86421f2043bbb8c8a5e52a6f9560f740d3cd45f40c2443cbeb4e6cf8a7ef770f586a819150568c5a5eeb4819145ad2aacfbfa75227ab27b248edb5f6700178e31badd952923878"}, 0x1f4) 11:49:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:15 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000001340)={'filter\x00'}, &(0x7f00000013c0)=0x78) socket$packet(0x11, 0x2, 0x300) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1320) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000014c0)={0x100, 0xffffffffffff8000, 0x6, 'queue0\x00', 0x2a79}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000001480)={0x5, &(0x7f0000001400)=[{}, {}, {}, {}, {}]}) 11:49:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000002600)='/dev/dsp#\x00', 0x20, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000002640)={0x0, 0x84, "174a68059e083423117e11f9fadc24f49e7c246ae50411e8add1877949e20335e7fda0588611df7a8799ba299a0d2320eff9f89f47e7aeff5cc08d152b268c1ce62d89ef592998337d21daf4c01bb563335c2e165283af39f9b3deb36c207ba997767a02b83efa61dc38a388f5c469d75fc6df2504d2fa56e2fe1a0c49c93bb041d586a7"}, &(0x7f0000002700)=0x8c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000002740)={r3, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f0000002800)=0x84) 11:49:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1f, 0x400) clock_gettime(0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x101000) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000000c0)=""/247) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:15 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000000)={'erspan0\x00', 0x8d62}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000240)=""/72) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c, 0x800) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f00000000c0)={0x2, {{0xa, 0x4e20, 0x2, @ipv4={[], [], @multicast2}, 0x200}}, {{0xa, 0x4e23, 0x8, @mcast2, 0x9}}}, 0x108) 11:49:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) 11:49:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:15 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = dup3(r1, r0, 0x80000) epoll_wait(r2, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x7) r3 = fcntl$dupfd(r0, 0xdbdc672dcc7849bf, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b0") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000140)={&(0x7f0000000100)="824f43ef8075d028e2e4603b05238ad553bfaf225af00cc60fe2bfe9ec01540c6a006f010d10cfa35aa2533a", 0x2c}) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x2a48dfff223d560d, 0x4d, 0x4000000000000000}, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) 11:49:15 executing program 1: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x101, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00'}, 0x30) sendmsg$nl_netfilter(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0xa0, 0xd, 0x5, 0x108, 0x70bd2c, 0x25dfdbfe, {0x7, 0x0, 0x5}, [@nested={0x84, 0x91, [@generic="0a0b5e2063eb3f3d51e7a905807e034ce47a6e66ce6838c37a464f2b38211280fa8cfffcaadebf8f257b58d5f80b36887bea46164c909391abc6ea440599e51981130769d82107c6634498ea352061b11164491c2376730839c86462b16ad538e1dde6", @generic="81e7405205f6d7f45a", @typed={0xc, 0x96, @binary="fbe97e41a95f"}, @typed={0x8, 0x40, @pid=r1}]}, @typed={0x8, 0x62, @pid=r2}]}, 0xa0}}, 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e20, 0x8a5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, {0xa, 0x4e24, 0x7fffffff, @dev={0xfe, 0x80, [], 0x2b}, 0x100000000}, 0x0, [0x5, 0x10001, 0x7, 0x1ad, 0x7, 0x100000000, 0x74d8, 0x80]}, 0x5c) r4 = getpid() sched_getscheduler(r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21001000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000084}, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:15 executing program 0: sysfs$1(0x1, &(0x7f0000000000)='\x00') r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) ptrace$setopts(0x4200, r2, 0x3, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000040)=""/206, &(0x7f0000000140)=0xce) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b0") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) [ 496.684631] net_ratelimit: 16 callbacks suppressed [ 496.684639] protocol 88fb is buggy, dev hsr_slave_0 [ 496.694730] protocol 88fb is buggy, dev hsr_slave_1 11:49:16 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8080, 0x56) setsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000080)=0x76d, 0x4) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = userfaultfd(0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0xa8000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r3 = fcntl$dupfd(r1, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:16 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x800) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) fcntl$setown(r1, 0x8, r3) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) [ 496.764648] protocol 88fb is buggy, dev hsr_slave_0 [ 496.769811] protocol 88fb is buggy, dev hsr_slave_1 11:49:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b0") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000042000102000000000000000000000000f91537f10f295a8670ecdd03bbb0dc5584c1872d71a16e16aec89f87c28977d1273790777d6743d947967b4b29bff2ba8343f38ca8f1b0f49f2b6b2bee85af7727792effa41b60b5a5ed80be661e5e505c033366518d3e65b97c14fadadd558e6886ef4029cca1684a9ea1f9f1bb1fb21f78003e876216fe1833c3172f1e1d3afacb7e9dc6b6beb457ca0b6ecce0a255d85874ebe8f66c08b430780bfb898f3780bb893fad4c241c51d08578f559b9134c1534455386ba562725d3108cbb46"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:16 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x80000) getsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0xe, 0x7, 0x7fff}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = userfaultfd(0x40000000000) r3 = fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf32(r3, &(0x7f0000000600)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) flock(r3, 0x2) 11:49:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 497.004638] protocol 88fb is buggy, dev hsr_slave_0 [ 497.009736] protocol 88fb is buggy, dev hsr_slave_1 11:49:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000080)={{0x6, 0xc33}, 'port0\x00', 0x10, 0x800, 0x7, 0x8132, 0x8, 0x7, 0x9b2, 0x0, 0x4, 0x3}) [ 497.084633] protocol 88fb is buggy, dev hsr_slave_0 [ 497.089771] protocol 88fb is buggy, dev hsr_slave_1 11:49:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:16 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x3ff, 0x80000000, 0x8}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x2, 0xfffffeb7) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000140)) r4 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:16 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x800) r2 = fcntl$dupfd(r0, 0x0, r1) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0xcb, 0x1}]}, 0xc, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000280)) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='scalable\x00', 0x9) bind$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0xe3a9cbc72f218ed3, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYRES32=r0, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESHEX=r1, @ANYRES16=r1, @ANYBLOB="710a4d6e2e1f", @ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r0, @ANYBLOB="397417ada280e8bbd3ff728511bbe175faaa40820548de5711cbbfb81111eb112644c85e0c70f359013987ce448417a3e183df37e6619b828863b33d785f6669e86cc25c06e34d357cfacc28f509f507c64d2a053c570984316f007d5574e806673ad4a5dd9a85f5fea81382c050ab277323fb2673ef3553", @ANYRESOCT=r0, @ANYRES16=r1, @ANYRESDEC=r1], @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRESOCT=r1, @ANYRES16=0x0, @ANYRESHEX=r1, @ANYBLOB="cce89313a2af2d1e18d4c4bbc12689e1317f64ddc06460a92868ab4702f584175d8d56e4e2ee564f628e5cc2fe0fc0163ca4ab98cff5bfd737c800924199064cd3ecc55d69a75994ceb2037b0624cfb30051078f07cda42bc1f5f4d63a44bdecff05262411"], @ANYRES32=r1, @ANYRESHEX=r0, @ANYRES64=r0], @ANYRESOCT=r0, @ANYBLOB="f2a0452a44c839334e888cf690ef654dc195b95e43c21a91ea2680a7a2000596ac8e9e0a33d21a811777d72aa19ed74d216f768bd1effd96a9b975c83e5410a9323f8911daf72340835a98c9968a9880b3ec210af1031bb2f09aebff5753872ecaf86f78a804f989f80af273813a667e9d31d270c720df34aa30481f751a989b23f59f374d22ff", @ANYRESDEC=r1, @ANYRESOCT=r1, @ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRESHEX, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESDEC=r0]]], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) [ 497.404669] protocol 88fb is buggy, dev hsr_slave_0 [ 497.409940] protocol 88fb is buggy, dev hsr_slave_1 11:49:16 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) 11:49:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80044501, 0x0) 11:49:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:16 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) 11:49:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$sock_proto_private(r0, 0x89e5, &(0x7f0000000040)="2ee110611777b9a52a649ec2f33c73e34292c53dc1ec28aea3cbae4e1f83612df3a6e35a1fbde141dc95cbbed1746b0b6b37536d3837c1a1eb73265f23a6662b355a96f509dfd3739ac18525fe42e3d73286441e600590929b4281f66b2dd635e67eaab193bdfe98515b0a6aa15f6a3d29e3d43191ecfcc237c650aeca77d5542aa8ecbd2bff45213c71f7d672585fff2d65c7792c6521291654b0ee") ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000740)={&(0x7f00000000c0)={0x27, 0x0, 0x2, 0x6, 0x2, 0x0, "069e60aff92223ce07536d09d215c82cc2bbda81d48f4bb767612ed21e2b434aee7fd0b2672494126fba6e4aa25245762c031d76eb8b65d213663ca545223c", 0x4}, 0x60, &(0x7f0000000680)=[{&(0x7f0000000240)="22c44558c121a97b3a24308ff0b772b92808bd4178c82757d5bf71ccadf696c594167a3e9135d902b934ff6203cedb6a02acd7107d97508dd76863d2aa3d81583d8f091762be45b683936df350839271238fae895d875af82ad8ed6cca1ccb6460322195206f829073600e1a90ba65b9217590d43fae0dda3754ecf5985f2d1662934f51ad094278cceea2330a8874d13d9b8d98806a37fe8351b39b601a9b15b5a06c2a7ad1fa9a30c4a63e65f8e6c03fb4dc9efe4eb2dc4a35a7954884bcf9e297d001dea4d26e49a8b1eea73a2b94aa52ecc06c188e51189d80e34f62f30c0cc6a213eb1a82b78063f3012ae1e55b80cbb4", 0xf3}, {&(0x7f0000000400)="44de07987d105a18d2656dccac12c767c11cd515242024e7b5261946d5e5f2b7740db1443876f4fc25ce567f5cc7d4ffbbc89c00033a05e1441f518ba669a4dff76ebb1778c27d95b802eaa94ed8151444df2be29c35ec2b54f8306730a7eeafdfb52c0e655df0e62d4ce7ebce029907ba99813bb2e4900a9f26fd29c9ac2ea0236eb17e51113642abffa520cce35c6e79064aaffdf0ee22583808d6158ab82ca6734b3db6c3123e32a4195d10a8301b8e2d9eba9ed59b9c86c44143f98e820508029fc623f1a2a1c3e7680d8d50d733a86c444ad05eafdc26", 0xd9}, {&(0x7f0000000000)="d1b64831fdd2dc2942d992", 0xb}, {&(0x7f0000000500)="bfc6a6b827b17cb08c24e6f1f9dc03c23d513d6462b05bc4f4f283851b038c87966f9ce4e3b55fbfc57657209bd4968c75094aa8bdcd0522cbcf3848ee2b3a232fec5c9e11b5734f8f86d3842d5c5d53a174aba011c37f8b7a0325984c759cb369f4deebdfd1e214e5a7a2dd9590fbf5a730cc8bd83df582c9074896eb0d1f77bd76bff1c8972b1ad95c9e5514629f5554a42d46cac05e9059f30860da27d0343c78685ae207a2dca3b1e055df11adadab7d304a7badfb506fae81a72e6f7a95c712ed7848fde22a07b9300647a5b05534c8e66e308b13b805", 0xd9}, {&(0x7f0000000140)="f26701e6f763d819fe04957c62ade0b3ac075be45df8e2ccfee50edfc0313f69bdddf38994ed5d7fbf8aa9cac17f5d4c6106c4e2754c5e26235fb0000140c0470c94f2b962a97cb7365c4b8c899b30e87d02c4cc3c730d9b339592a9f56d0b9fa557cd7924450a294c", 0x69}, {&(0x7f0000000340)="ca7cbddf831ac0e4751cadc8b79f068bec106a22e621686a1a438896ba947affef6d05507932d01d7f1d3e8bc524b0eaac63b8fdf668f668c2544393f29959cb98ee276d7da03339be925bb1a93da5", 0x4f}, {&(0x7f00000001c0)="d393513931f6d4b16b02458589fb905d2d0d", 0x12}, {&(0x7f0000000600)="21bfe3e10c39d9765ef31b745deb98139857fa55465ec08c27320be46dd38268abfcf7badb2728b30f396c1621ed74f1974102cb7f75eb2595f4b870b874918dff0fc00f07ba", 0x46}], 0x8, &(0x7f0000000700)={0x18, 0x103, 0x8, "04"}, 0x18}, 0x20000001) 11:49:17 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x244, r2, 0x10, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa73}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x72}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x289d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x832}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a}]}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xaa00000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffd1ef}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x40801}, 0x1) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000180)) 11:49:17 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000000)=""/92, 0x5c, 0x2000, 0x0, 0x0) sendmsg$nfc_llcp(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x7, 0x8001, 0x200, "bc016632089aa287bee30163d92e934077799d33eb37f6c1be303e2dda1231bdfe74143d592249c17a4b8e12df8cf4427838557d108add2f0904d124025af9", 0x23}, 0x60, &(0x7f0000000200)=[{&(0x7f0000000100)="2022665bd7ac07", 0x7}, {&(0x7f0000000140)}, {&(0x7f0000000180)="559b18e8df1d0898cd99df371b44ef6834baa4057b07472b3f81e9d1bd298e76de3156580d28254a136747550d18b436581cc252a887a48dfce922de63317d08d6cb100417e0fac807b149dd03e428b680ec98a3ee6e99fac293a52f1a9ae26ca613d9af9d6334d610e4", 0x6a}], 0x3, &(0x7f0000000240)={0x60, 0x103, 0xb9, "e4e6aba3c1308f855005f127f121a1ea39856035330cbc65d16366863050a53967d719d29d52f157a0e4c86559c3c3481ed439a6eeb63df985af1ccc3ecbebb05c4943bf21a37df847384f"}, 0x60, 0x14}, 0x48004) geteuid() 11:49:17 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x40101) write$FUSE_WRITE(r2, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x1}}, 0x18) clock_gettime(0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'syzkaller1\x00', 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000050a43ba5d806055b6fdd80b40000000140003000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) iopl(0x3) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000140)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000004200019259cdfc5c38fe9b00fe000002428d6bd78dc9463c6f489540d47b7e88fc184adf44c6c977771bf20e5cfe17f8da0a9e27a405b27e357458ec36c85b07dfa626f4251a556992dbe21066509d06aadc"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0xf7aa, {{0x2, 0x4e23, @remote}}}, 0x88) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xa, "e37561038453d18df46c720cfc00"}, 0x10, 0x2) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000240)=0xffffffffffff7fff) 11:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:17 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000080)={{0x6, @broadcast, 0x4e23, 0x0, 'dh\x00', 0x10, 0x8, 0x5f}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x4e24, 0x4, 0xfffffffffffffff7, 0x6, 0x1}}, 0x44) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x1}) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="05005114b6e94ac73206f5a9a67108cfa6b240483044529ce4073c9bb2bae71030cdc9bb90ec91a25ae3d1a0fe55d42bebd1a3c487f5e8719dab715dcec32ede34f8efa9e4903289c40f060d72634a82789dc472e7535ab1e5936f1e0556a72c430c9188c0bfd7befbe06cfb93a9b18f190c968d1e5b96573218b9d505886c60d427ad73722f", @ANYRES16=r3, @ANYBLOB="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"], 0x98}, 0x1, 0x0, 0x0, 0x40}, 0x4004800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) 11:49:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x240, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xbf9) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x8000) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) accept4$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) 11:49:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="251066fb", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0xa}, 0x8) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80044501, 0x0) 11:49:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:17 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000000000)='./file0\x00', 0x0, 0x200000000007}, 0xfffffffffffffe3b) vmsplice(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="ef0fa104eb215e6adad4c34e8b62af33018b375f4f4240d63f68c4b1781d37fe2c4105d80f4ebff1d9ee224d2e69f94c0498780de517f8891546de8f6124753394f742ea36628cd41138ae9e16a94714d8aa6420b3138a02f8785938bb8b83e7b59611a8c3b62a756a459d4bd4f4e327f1bfb656c7e9a4dee1bca699910b1c2ff01cfc1cffb2e45d31dc11", 0x8b}], 0x2, 0x8) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = userfaultfd(0x0) r3 = fcntl$dupfd(r1, 0x0, r2) socket$inet6(0xa, 0xf, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:17 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 11:49:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000000)=0x3f, 0x4) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ustat(0x6, &(0x7f0000000040)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:17 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$inet6(0xa, 0x803, 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), 0x4) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x3f) r2 = userfaultfd(0x0) r3 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x44c9}) 11:49:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000005f80)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000005380)=ANY=[@ANYBLOB="7f"], 0x1) write$binfmt_elf64(r0, &(0x7f00000055c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000c600000000000000000000000000000000000000000000000000000038000000000000000000000000000000000054ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090f8def60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xc9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendto$inet(r0, &(0x7f0000000f40)="03", 0x1, 0x3, 0x0, 0x0) 11:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x4, &(0x7f0000000040)=0x0) io_destroy(r1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) io_setup(0x7, &(0x7f0000000080)) 11:49:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:18 executing program 0: r0 = add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="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", 0xfb, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0xbd78dc163602e88e) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = userfaultfd(0x0) syslog(0x9, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="6868d8b2", 0x4, 0xfffffffffffffff8) keyctl$revoke(0x3, r4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80010) ioctl$VT_RELDISP(r1, 0x5605) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:18 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000000c0)={0x42, "a77946cd547e22571aa716f3160c1240c4017104066fac53fb51cd542994e58e079abfbe93ef71e54f510e0db878c6dd1fdb4456e82071ad2bb7b77d6d92c0182fa19f3e6b1464b5839ef8a8718e1bcacf0cdbb60a5a69256586ac598454cc85bbf1336c38f5373a3d5cadd37cd318785efa67ec7e3ad305b1a7d4c82749e8c6"}) timer_create(0x3, &(0x7f0000000000)={0x0, 0x11, 0x1}, &(0x7f0000000180)=0x0) timer_delete(r2) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) close(r0) 11:49:18 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x5) 11:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:18 executing program 2: io_setup(0x1d82, &(0x7f0000000000)) 11:49:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r3, 0x80000001, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @rand_addr=0xd1}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x118) 11:49:18 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$tun(r2, &(0x7f0000000000)={@void, @val={0x3, 0x4, 0x89fc, 0x7fff, 0x1000, 0xffff}, @x25={0x3, 0x1, 0xf1, "7d7170042a9e6c41c21eba5c5b1c9ab957732e4aab5701ee57ddc898ab407ce370b0e56fbb78901647fdca8062e4bce5270f5f5635cb3cfd7261b4cbd8d702bd6c51df1beeb02a86d71832"}}, 0x58) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) fsync(r1) 11:49:18 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c57, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) syz_open_procfs(r0, &(0x7f0000000140)='numa_maps\x00') r2 = geteuid() syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7b865cc2, 0x4, &(0x7f0000000500)=[{&(0x7f0000000240)="7a8dddc7a4b462534a16b0b990de6e6f4560b1b403c46a62269cff9919fcdd5687d76ff7fc853566a48d888ec5b02cddd0fb038c3c7d66e81bf69d003fa2be9166fb796baef0d446dcbdca6db9dd50ceb58852b5f41a36a2aa17e6e6494195fe5f61c1100f8db20e24e88f70", 0x6c, 0x1}, {&(0x7f00000002c0)="c5e4cb10ee5443ae12dd917b1e68b0b5975fc19279a427cea3a3f721b6429cbefa7247b7c9caf4e0f3e49281984d5dec750f21521c4ae100e18d4fdf0264b7aa57cb3aa50058025e9f2a88680c441d6c8490dc420b517edc5a6c5af2f73a75a40b42cee7f11e510bd0ee74f053f5a04073733bdde0cc2df37382e8d34e1b2e45541c8dc29ba4255720865b8f7e2cb100fced95ff8c84b036cc0135e73dedf622a4e1fa3ed86d3e4b216065df41f5451a63abc4492f9f11d774e358", 0xbb, 0x81a}, {&(0x7f0000000380)="4168361bc99239ef31e5a8ae614d9af409f155119eb11e49161c26250a937ffc973284dfcc209e8160a61e5b6f98eb0ce561993f0ecdc0ecaab0747d111dbbb991a4c011874cbcf40a4e570b5d31a8973e031874", 0x54, 0x7e}, {&(0x7f0000000400)="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", 0xfd}], 0x100000, &(0x7f0000000580)={[{@umask={'umask', 0x3d, 0x6}}, {@resize='resize'}, {@nodiscard='nodiscard'}, {@discard_size={'discard', 0x3d, 0x6}}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure='measure'}]}) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x0, 0x40000000, &(0x7f0000000000)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x255, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9a2964bdfe9f28e6c6b4858164701400000042000102000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(0xffffffffffffffff, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, 0xffffffffffffffff, 0x0) 11:49:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r1, 0x90084520, &(0x7f0000000180)) 11:49:18 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000000)=""/166, &(0x7f00000000c0)=0xa6) 11:49:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x869, 0x4481) 11:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8200, 0x0) r3 = getpid() sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11108000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000003400000426bd7000fbdbdf250e00000028003b00080011000000000008001f00", @ANYRES32=r3, @ANYBLOB="14001c00fe80000000"], 0x40}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000) r4 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:19 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), &(0x7f0000000500)=[&(0x7f0000000180)='\x00']) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x80000) 11:49:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x9, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80000) connect$can_bcm(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201, 0x0, 0xffffffffffffffff}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x8200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x18) r2 = userfaultfd(0x800) r3 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) 11:49:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0xa0001, 0x0) r1 = userfaultfd(0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200000, 0x0) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000180)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'syzkaller0\x00', 0xc949}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008932, &(0x7f0000000080)="0adc1f123d9e9e9dff5b37f56fa7870a1be1da5a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000040)='keyringmd5sumvboxnet0\x00', 0x2) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7, 0x200000) write$P9_RWALK(r1, &(0x7f0000000100)={0x23, 0x6f, 0x1, {0x2, [{0x0, 0x3, 0x1}, {0x96, 0x3, 0x6}]}}, 0x23) recvmmsg(r0, &(0x7f0000001cc0), 0x4, 0x10102, &(0x7f0000000000)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x52cd, 0x10000000, 0x9, 0x1000, 0xffffffffffffffd0, 0x3ff, 0x3, 0x2, 0x7, 0x1000, 0x2}, 0xb) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000040)={0x0, 0x0, 0x2080}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000002100)={0x2, &(0x7f00000020c0)=[{0x5, 0x9, 0x2, 0x5}, {0xfffffffffffffa92, 0x4, 0x1, 0x80}]}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:20 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), &(0x7f0000000500)=[&(0x7f0000000180)='\x00']) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x80000) 11:49:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x800, 0x0) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x3, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x248300) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000240)) 11:49:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:20 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 11:49:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:20 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101140, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x2, 0xff, "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"}, 0x107) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2200, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000080)=""/130) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:20 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:21 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), &(0x7f0000000500)=[&(0x7f0000000180)='\x00']) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x80000) 11:49:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = shmget(0x0, 0x2000, 0x1002, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000240)=""/4096) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x101000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) 11:49:21 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000000)=0xfffffffffffffffd) 11:49:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x5) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 501.964631] net_ratelimit: 24 callbacks suppressed [ 501.964640] protocol 88fb is buggy, dev hsr_slave_0 [ 501.975126] protocol 88fb is buggy, dev hsr_slave_1 11:49:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x400340, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000300)=0x3) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x101982, 0x2) r3 = userfaultfd(0x0) write$P9_RXATTRCREATE(r2, &(0x7f00000002c0)={0x6, 0x21, 0x3}, 0xffffffffffffff9c) r4 = fcntl$dupfd(r1, 0x0, r3) sendto$x25(r4, &(0x7f0000000180)="52b7f214fd96099c9448e308fce919174d97677f2ea13ee33234a38b154239449b7da00750e25d4e82497124fccaea073c7cb27366daf8c28c4b0f3350b6a163c619c121e3ea2eacaa09a5f512d5e6d50b40a73bb29e1c0b21f370954215538e324ffbc082ddf57fa6645f435be0a8b3a085c57bacffca5cad14178e89adb48ee4246a0d66ef3ae5f83fd72c45a8f770d88db804c16e69c3", 0x98, 0x1, &(0x7f0000000240)={0x9, @null=' \x00'}, 0x12) getsockopt$inet6_buf(r4, 0x29, 0x2a, &(0x7f0000000000)=""/246, &(0x7f0000000100)=0xf6) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x7, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000080)={r1, r2+30000000}, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000140)={0x1, 0xfe, &(0x7f0000000240)="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"}) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x2000) r4 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_elf32(r4, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x947) ioctl$EVIOCGBITSND(r4, 0x80404532, 0x0) 11:49:21 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x2, 0x2, 0x401, 0xc00000000000000, r2}) clock_gettime(0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x0, 0x1ff}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r3, @in={{0x2, 0x4e24, @local}}, 0x8000, 0xfffffffffffff001}, &(0x7f0000000180)=0x90) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000004200010200000083327085884b47301a7f8bdd3e2f0000000000060000003648294ecfb59fd4a7bd957bf30ebeda781f54ce0c4fa7948ce107b419b52fdb7f8cead2cfd0ba6784845e914408386ebcd857e7a7ba200487ddc93f84d61820657f65461bc81dd063e6c5ad4dcddec76a66cdf59f3b4a6f0db60858cbd7"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:21 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xef75}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r3, 0x3ff, 0x7, 0xffffffff}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:22 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), &(0x7f0000000500)=[&(0x7f0000000180)='\x00']) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x80000) 11:49:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:22 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x600, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040080}, 0x800) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = userfaultfd(0x3) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x3, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000000005d3f089d07cbe9c6e1b0af996962677b525c0a0d81956be59a37cc9b40f748b18295fea78eab219a3c9b15099de72a82191b5814f5570b73b5f4126d62d260ff5f8a0aa9d83c7a540046fa2f8cba3d15810b58f9e959b9000000000000000000000000172fefb722f38fc0deb6bf38d675a3a4b5258e83026002f91f268a316c"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) lseek(r0, 0x0, 0x2) 11:49:22 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r3}}, 0x10) write(r0, &(0x7f0000000100)="b7272401ce25850e676ed342765b11ecaa49767ee04c0bc1c8f43ee22bcec54664e0272bf0ba1f704b7dd17b3aebfbdf1a2c792b59cd562f023cafdf545b757074bea90ff16861a8cac1f47d08ea8ef37f48bb1e2b4b3cc3ef3b9a85ba996fea65addd41a3f59e2da2b4daf713bdfabde124db09333fe5b5b2eab66e3daa3248b221bb96854ec92a4f96b664d44c5316ad", 0x91) r4 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 502.924656] protocol 88fb is buggy, dev hsr_slave_0 [ 502.929901] protocol 88fb is buggy, dev hsr_slave_1 11:49:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x18, 0xfa00, {0x2, 0xfffffffffffffffe, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000014c0)={0xa, 0x23e}, 0xfffffd31) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000001640)='/dev/input/event#\x00', 0xfffffffffffffffd, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) r3 = gettid() syz_open_procfs(r3, &(0x7f0000001500)='net/udp\x00') r4 = add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000240)="765a4856ba9ad1e2fdb0e4d3cdd5137e71ca3e5c9866eafd4099e8b408b497f5a9d11e86ac51bb27f33bc77effc17ad71eb817ed7425fefc2f7592e325b0881f2a94f196082238dd7c2613c0bc159bb97a472d2bb9c2c15fb137713311bec0b31cc96786ec9a1748902c4d20aef908fbce6649b1c4923ea15980e54eeecce0c6df59b1a308df495a8def615aebc91b2d774e1844611bf4aca77d9f586ecf34c85b78c4", 0xa3, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r4, 0x834d}, &(0x7f0000000300)={'enc=', 'raw', ' hash=', {'rmd128\x00'}}, &(0x7f0000000380)="bb8e9cce9cc693ce8a9ef92c35a41329af2fa28d0cda19f2f858342eaded2744b71d9eaeb075484a78bdda0124c7e2cd785251208ac6749aec274238e8f29179f52b727fdbb56673757a51750e2555b5f4f3760dc2a6ddb0ecf394fe4720c0aafeefe51480e013c72173ecb85bb1cd93f5f5c5b57db668a5ede910988307d53caf37e301a386bbde863e8a91afbf52e7607f527ff28cac9e1c534c4ca0a2dc3782a714baec436a03fd3450f98d4557e64fea222d32edf944ef836bc45649ec83ec", &(0x7f0000000480)="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") ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x3, 0x2, 0x10000, 0x1, 0x7fb1}, 0x7, 0x4, 0x8}) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000001540)={0x0, @bt={0x101, 0x80000000, 0x1, 0x2, 0x4, 0x4, 0xfffffffffffffff8, 0x7f, 0xffffffffffffff86, 0x3, 0x2, 0x3, 0x4, 0x4b05, 0x12, 0x24}}) [ 503.004666] protocol 88fb is buggy, dev hsr_slave_0 [ 503.009857] protocol 88fb is buggy, dev hsr_slave_1 11:49:22 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x400000000000800) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) getpeername$ax25(r3, &(0x7f0000000040)={{0x3, @default}, [@bcast, @null, @default, @rose, @bcast, @bcast, @netrom]}, &(0x7f00000000c0)=0x48) 11:49:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 503.244641] protocol 88fb is buggy, dev hsr_slave_0 [ 503.249920] protocol 88fb is buggy, dev hsr_slave_1 [ 503.324636] protocol 88fb is buggy, dev hsr_slave_0 [ 503.329756] protocol 88fb is buggy, dev hsr_slave_1 11:49:23 executing program 2: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, &(0x7f0000048000), 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140), &(0x7f0000000500)=[&(0x7f0000000180)='\x00']) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x4000001) setreuid(0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x80000) 11:49:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000040)=0x1, 0x4, 0x5) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x3, 0xfffffffffffffff9, 0xffff, 0x0, 0x2}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) r3 = userfaultfd(0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x7}, &(0x7f00000002c0)=0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r4, @in={{0x2, 0x4e24, @local}}}, &(0x7f00000003c0)=0x84) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) tgkill(r5, r6, 0x1c) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) pivot_root(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00') ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) accept$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000480)={'eql\x00', r7}) 11:49:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) clock_gettime(0x7, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8100, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000140)=0x2) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x68, 0x0, 0x8, "2ef0b1cda87ee86435df6d9471e4544e", "9fc0637b8581ec8541a3f6277dfa75f4dac14ca99870f72c07e36e448793a0dffe76b666680355d8833b955086e967823cf842004aa80c3430a790fc3a32b9f2aca596a559a5eca1bfe041f5842a59000099da"}, 0x68, 0x2) rt_sigsuspend(&(0x7f0000000000)={0xee}, 0x8) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x101100, 0x82) epoll_wait(r2, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x5, 0x1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x539401, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2008200}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="01a080ad2b36f8d2bc6c5f68c327403930d02b106b1326c55fb8f8bb59550a997929dce6a1af5ddc04568623cb91d73619ce0c13c2eb7f87e4584877fd3da91aaef4b49976938aadc675adc060f865eb0b2aa94308dc15282b0dd196319c9b43fb651c415031c73772c33c1b943d36fbf94c635a9f39a72b1de05043575780d522161cbb754247dc461e", @ANYRES16=r4, @ANYBLOB="000026bd7000ffdbdf250b00000014000300080007004e2300000800030001000000600001000c0006006e6f6e6500000000080002007f000000080006006f76660008000500030000000800050004000000080004004e2300000c000700010000000c00000008000200060000001400030000000000000000000000000000000000"], 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x80c0) syz_extract_tcp_res(&(0x7f0000000040), 0x2, 0x0) 11:49:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000102000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) mq_timedsend(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x8, 0x0) msgget$private(0x0, 0x10) sendto$inet(r0, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) 11:49:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x4000000000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x98fa, 0x5, 0x400000}) 11:49:24 executing program 1: r0 = semget(0x1, 0x4, 0x8) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f00000000c0)=""/65) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x2) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) r2 = socket(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000001c0)) clock_gettime(0x0, 0x0) recvmmsg(r2, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ed4e000042000102000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20001, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8, 0x8, 0x7ff, 0x8d9, 0x0, 0x625e, 0x0, 0x0, 0x80, 0x3a5, 0x1, 0x4, 0x800, 0xfffffffffffffbff, 0x3, 0x1, 0x800, 0x7, 0x1, 0xfffffffffffffffe, 0x0, 0x81, 0xfff, 0x1, 0x8000, 0xfffffffffffffbe8, 0x0, 0x62ce, 0x1000, 0x1, 0x6, 0x514c, 0xf2c2, 0x800, 0x3, 0xffffffff, 0x0, 0x400, 0x3, @perf_bp={&(0x7f0000000080), 0x3}, 0x1004, 0xd403, 0x10001, 0x0, 0xe8, 0x8, 0x8d9}, 0x0, 0x4, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) 11:49:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:24 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000040)={0x0, 0x4, 0x9, [], &(0x7f0000000000)=0xfffffffffffffff8}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$inet6(0xa, 0x805, 0x2) sendfile(r0, r0, 0x0, 0x200000d) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000005c0)=0x20) 11:49:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat(0xffffffffffffffff, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x401, 0x400000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x96, [{}, {}, {}]}, 0xffffffc7) r2 = userfaultfd(0x0) fcntl$dupfd(r0, 0x0, r2) 11:49:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x79a, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r3 = getuid() r4 = geteuid() mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10, &(0x7f0000000240)={[{@index_on='index=on'}, {@metacopy_off='metacopy=off'}], [{@fowner_lt={'fowner<', r2}}, {@uid_lt={'uid<', r3}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@subj_role={'subj_role', 0x3d, '/dev/input/event#\x00'}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) 11:49:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat(0xffffffffffffffff, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 2: set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) 11:49:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000080)='/dev/input/event#\x00') ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x8) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x36, 0x0, 0xfffffffffffffffc, 0x0, {0x8}}, 0xa}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = userfaultfd(0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000000)={0xe3, ""/227}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) openat(0xffffffffffffffff, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:24 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0x5, 0x1, {0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd]}}}) r1 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1104400000016) 11:49:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'bpq0\x00', 0x2}, 0x18) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7fa) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) [ 505.728435] IPVS: Unknown mcast interface: bpq0 11:49:25 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) r3 = semget(0x0, 0x1, 0x484) close(r0) semctl$SEM_STAT(r3, 0x2, 0x12, &(0x7f0000000000)=""/247) [ 505.767012] IPVS: Unknown mcast interface: bpq0 11:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:25 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x6) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r1, @in6={{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x2b}, 0x3}}, 0x3, 0xd03, 0xd1b9, 0xa93, 0x1}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0xaed7, 0x20}, 0xc) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = userfaultfd(0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$SIOCRSACCEPT(r0, 0x89e3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, 0x0, 0x0) 11:49:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x20000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000200)=""/236) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x200040, 0x0) ioctl$SIOCAX25GETUID(r4, 0x89e0, &(0x7f0000000140)={0x3, @default, r3}) 11:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x400, 0x480) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000000c0)=""/78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:25 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) userfaultfd(0x0) r1 = fcntl$dupfd(r0, 0x400002000000408, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) 11:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:25 executing program 2: 11:49:25 executing program 2: 11:49:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:26 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x3, &(0x7f00000000c0)='%#\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) r3 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r3, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:26 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x2000000000c01, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000080)={r1, r0, 0x7fc000000000000}) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r4, 0x0, 0x8b, 0xde, &(0x7f0000000100)="cd0ef3339c473627c5dca725e2a4f4d362d4190ec98255c849321338e03552e07f4f5f94d6c819424daa267e9dc4b9c7e6d76b359c0200c6b56051a2a4c3808fe8773b018f094773fd75601e946e52b0137af3a8451fc56c8ebc8f0c1e74023903fb92a393c56c07e039d4a042d3351d9a7737020dd8c311f67f35e962d24806e494d5d4bcb72792e89bf2", &(0x7f0000000240)=""/222, 0xffffffffffffffe1}, 0x28) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:26 executing program 2: 11:49:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:26 executing program 2: 11:49:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:26 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = userfaultfd(0x0) fcntl$dupfd(r0, 0x0, r1) syz_init_net_socket$rose(0xb, 0x5, 0x0) 11:49:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) setsockopt$llc_int(r1, 0x10c, 0x2, &(0x7f0000000080)=0x5, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) [ 507.084640] net_ratelimit: 16 callbacks suppressed [ 507.084648] protocol 88fb is buggy, dev hsr_slave_0 [ 507.094738] protocol 88fb is buggy, dev hsr_slave_1 11:49:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup3(r0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x29d}], 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000500)) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, 0x0, &(0x7f0000000200)='dns_resolver\x00', 0x0, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000180)={0x1f, 0x0, {0x5, 0x3f, 0x0, 0x6, 0x0, 0x8000}, 0x2, 0x7f}, 0xe) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000000)={0x10000, 0x100000}) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) write$cgroup_pid(r4, &(0x7f0000000240)=r2, 0x12) r5 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8, 0x4002091, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 11:49:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x345, 0x2200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x98, 0x0, &(0x7f00000002c0)=[@enter_looper, @transaction={0x40406300, {0x1, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x50, 0x8, &(0x7f0000000140)=[@ptr={0x70742a85, 0x0, &(0x7f00000000c0), 0x1, 0x3, 0x10}, @ptr={0x70742a85, 0x0, &(0x7f0000000100), 0x1, 0x1, 0xa}], &(0x7f00000001c0)=[0x58]}}, @register_looper, @transaction_sg={0x40486311, {{0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240), &(0x7f0000000280)=[0x0]}, 0x40}}], 0xd, 0x0, &(0x7f0000000380)="23976d768205f9f48312be5249"}) socket$unix(0x1, 0x7, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 507.164633] protocol 88fb is buggy, dev hsr_slave_0 [ 507.169750] protocol 88fb is buggy, dev hsr_slave_1 11:49:26 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x3, 0x9}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={r3, 0x19, "082aa2937198df31033e8b07c6978da1b7f410cd6a5e9293a9"}, &(0x7f0000000140)=0x21) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x210, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:26 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:26 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000080)="6465bfb79ba9af771436727f4d7d09a73ad26886e2dbc4c82a9ae135f3d2acd16b45e577b4190640babc96cf4813ef2f3458ef5a15b7f836fa9572094e84acd1d13ad479", 0x44, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={r1, 0x0, 0x1ff}, &(0x7f00000016c0)=ANY=[@ANYBLOB="656e633d6f61657020686173683d736d3300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00100c9057702097b1efc63f2a933000000000000000000000000"], &(0x7f00000002c0)="34bf88b7f99641231b8955c6de59f4fb7f4fb80766c3aaa75f8107774b0c2b29c375c42c3eecc9ffd3f7046df841421c293c2dca0c39e42c0ac0273d80a59402f4c979240b2d61013d5b760c831ae64953fea10b9fe7f7fdad81ab1dec778424c28269b9d7392033aa2ce7f7ede20ef56a90b78640537fcb", &(0x7f00000001c0)=""/53) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/137, 0x89) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001680)=0x0) process_vm_readv(r2, &(0x7f0000001540)=[{&(0x7f0000000380)=""/37, 0x25}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/221, 0xdd}, {&(0x7f00000014c0)=""/78, 0x4e}], 0x4, &(0x7f0000001600)=[{&(0x7f0000001580)=""/3, 0x3}, {&(0x7f00000015c0)=""/55, 0x37}], 0x2, 0x0) r3 = userfaultfd(0x800) fanotify_init(0x10, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) write$binfmt_misc(r4, &(0x7f0000001640)={'syz0', "cf9180080d"}, 0x9) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0xac3c8ceca7126f08, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f0000001740)={{0x2, 0x5, 0x0, 0x2, '\x00', 0x1f}, 0x0, [0x200, 0x3f, 0x7, 0x3, 0x5, 0x60, 0x2, 0xfffffffffffffffe, 0x1ff, 0x8e, 0x800, 0x19, 0x1, 0x8, 0x0, 0xfffffffffffffffd, 0x1, 0xfffffffffffffffa, 0x800, 0x7fff, 0x4, 0x81, 0x6, 0x9, 0x4, 0x9, 0x81, 0x6d, 0xfffffffffffffff9, 0x0, 0x3, 0x109, 0x2, 0x3, 0x8, 0x0, 0x0, 0x9, 0xa97d, 0x7, 0xc81a, 0x4, 0xfffffffffffffff8, 0xaccab75, 0x101, 0x9, 0x7fffffff, 0x5, 0xfffffffffffffffc, 0x6, 0x7f, 0x0, 0xaf0, 0x1, 0x5, 0xc375, 0x8001, 0x800, 0x4b, 0x1004000000000, 0x1f, 0x2, 0x9, 0x9, 0xedea, 0x2, 0x2, 0x5, 0x1, 0x1, 0x1, 0x8, 0x73e8fea5, 0xfffffffffffffc01, 0x40, 0x3, 0x68c, 0xffffffff, 0x3, 0x8, 0xffffffffffffff81, 0x2, 0x8, 0x6, 0xfffffffffffffff7, 0x5, 0x8, 0x4, 0x9510, 0xf450, 0x0, 0x1, 0x0, 0x7ff, 0x0, 0x8, 0x80000001, 0x8001, 0xce7, 0x7, 0x7f, 0x5, 0x3, 0x1, 0x7ff, 0x5, 0x8, 0x8, 0x1, 0x5, 0x20, 0x2, 0x2, 0x9, 0x7ff, 0x1, 0x9, 0x992c, 0x100000000, 0xffff, 0x0, 0x4, 0x204000000000, 0x7e88, 0x3f, 0x60da, 0x200], {0x77359400}}) 11:49:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x2, 0x4) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) [ 507.404712] protocol 88fb is buggy, dev hsr_slave_0 [ 507.409886] protocol 88fb is buggy, dev hsr_slave_1 11:49:26 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:26 executing program 1: getresuid(&(0x7f0000000000), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = getgid() chown(&(0x7f0000000140)='./file0\x00', r0, r2) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 507.484637] protocol 88fb is buggy, dev hsr_slave_0 [ 507.489738] protocol 88fb is buggy, dev hsr_slave_1 11:49:26 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x803) r2 = fcntl$dupfd(r0, 0x0, r1) accept$unix(r2, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:26 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) [ 507.805400] protocol 88fb is buggy, dev hsr_slave_0 [ 507.811179] protocol 88fb is buggy, dev hsr_slave_1 11:49:27 executing program 2: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="58000000140019", 0x7}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:49:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x0, 0x4) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:27 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xa511) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e23, 0x10001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0x1}}, 0x2, 0x6}, &(0x7f0000000140)=0x90) 11:49:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x5, 0x1) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") socket$xdp(0x2c, 0x3, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 11:49:27 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400100, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000000c0)=""/70) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:27 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x2}) 11:49:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) 11:49:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000002c0)={'team_slave_0\x00', 0x400}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000300)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x200, 0x0) io_cancel(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0xffffffffffff2fe9, r0, &(0x7f0000000080)="eaa971d3eae8c6bdd76c4a1a4290e81601786c656e5a66ef117f0f50bc730677094d676afb454fb55d03fcd398a55f63355569d54a3e5c35d18797370c2b1c941b9774cb4d320bc2c7cccbec2fde8ea5960eac716c96ca4580e46eb15e6f443bf152c6b4e5a9e9efc0c6f6151c380e0becca531a81f93b1f1be43e1087ef747688ff3b83cda632b80d0e8aa4b5bd47c9d08f92c986326792e87e101ebb3a759a9ecd4446d4b0a4dc5d62319ca0616a3fd6608d364838501e89e591d390ab1ee515f2747e3f4e35222b3de040bb50f22a656e8ff557a9f6d39cfb8a149871ae", 0xdf, 0x94, 0x0, 0x3, r4}, &(0x7f0000000240)) 11:49:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:28 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x60) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) 11:49:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VT_RELDISP(r1, 0x5605) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) r4 = fcntl$getown(r1, 0x9) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001580)=ANY=[@ANYBLOB="2015000042000102000000000000000000000000747a91f42655c108007500e00000021371a8804978e70806f38d93e60351cb40ecb64f449939a11a51814c080144007ff15bf744b5985256c8fe2a39c3ce4f8e26d89f51e79e23c06ea502d8532fad58c465a09936477df2764a0879fb59320b4ab1e6482ca5ed1c58d3b91ed1e70163c55313d001d09b93232f335858f5c4a4b2c49e1910afeb114bef5ad8ff167cc88690b8fb5599d37669033f1c2a750c559502f39300984c2243738a0fce546c175b2b4cc76ff39858691f39550dfeb7c32fd50aa3863f906431a5cb73d18a4c2c1b5c5e2ec9e4fbe675d06f730366f51ab03f30d2d0f868c1f2c2a1cc16fe10b9ec45404df6ae9c46d6c7793d8ff6f7445dbc839442e07fac75d74244e279a862bb9cc60a161d1dd85285d414540a081f63113718394877e4e9330c12f7c5ea16000000d402680008002500", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB='\b\x00x\x00', @ANYRES32=r4, @ANYBLOB="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"], 0x1520}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) fcntl$setsig(r1, 0xa, 0x3b) 11:49:28 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = userfaultfd(0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x14080, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) 11:49:28 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000204}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x400, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x1c, 0x4, @l2={'eth', 0x3a, 'team_slave_0\x00'}}}}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 11:49:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:28 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$getown(r1, 0x9) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1b9, 0x1ff, 0x3ff, 0x80000000, 0x0, 0x8, 0x80000, 0xe, 0x5, 0x1f, 0x4e9, 0x1ff, 0x9, 0x0, 0x6, 0x800, 0x2, 0xffffffff, 0x3, 0xffff, 0x5, 0x1, 0x8000, 0x10000, 0xff, 0xfff, 0x0, 0x4, 0xffffffffffff0000, 0x4, 0x9, 0x3, 0x186d, 0x2c7, 0x68, 0xfffffffffffff801, 0x0, 0x5, 0x2, @perf_config_ext={0x84, 0xfff}, 0x20200, 0x4, 0xfabc, 0x619b9cd3bca4c59e, 0x6, 0x0, 0xde2}, r2, 0x2, r3, 0x2) r4 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, 0x0, 0x0) fgetxattr(r4, &(0x7f00000000c0)=@random={'system.', '/dev/dlm_plock\x00'}, &(0x7f0000000100)=""/207, 0xcf) 11:49:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0xfffffffffffffffa) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0xfffffffffffffffe, 0x46900) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:29 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 11:49:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:29 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x40010, r1, 0x80000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) r2 = userfaultfd(0x7fc) r3 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x10102, &(0x7f0000000040)={0x77359400}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)=0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="580000007d020000004300020029000000100300000001000002000000000000008000000100020000000002000000000000000001007b090076626f786e6574305e06005b7b2c7dc02a0000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x58) creat(&(0x7f0000000000)='./file0\x00', 0x8) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000004200010200005540abfc92783c060000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:29 executing program 1: r0 = dup(0xffffffffffffff9c) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x5, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000107000000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:29 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x1, 0xffffffffffffff9c}) getitimer(0x3, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000400)={0x1, [0x0]}, &(0x7f0000000440)=0x8) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) r2 = userfaultfd(0x0) r3 = fcntl$dupfd(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, 0x0, 0x0) 11:49:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") mlockall(0x3) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x80000) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:29 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000000)={0xd3, ""/211}) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)={0x0, r2}) 11:49:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semop(0x0, &(0x7f0000000500)=[{0x0, 0xfffffffffffffff8}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:49:30 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = userfaultfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000000)=0x1f) 11:49:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:30 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = msgget(0x2, 0x20) msgsnd(r2, &(0x7f0000000140)={0x0, "9acd"}, 0xa, 0x800) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) r3 = gettid() r4 = fcntl$getown(r0, 0x9) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)={0x2f0, 0xa, 0x6, 0x200, 0x70bd26, 0x25dfdbfc, {0x1, 0x0, 0x6}, [@typed={0x8, 0x1a, @fd=r0}, @typed={0x10, 0x8a, @str='keyring#\x00'}, @typed={0x8, 0x6, @u32=0x100000000}, @nested={0xc, 0x61, [@typed={0x8, 0x65, @pid=r3}]}, @generic="de95cd6b47d9438364", @nested={0x200, 0x43, [@generic="1a4e80f7aafcf6906d2bb5bb977530a3180adf62079a9f2d7e4df8413364ef68ed0df95c1cb2d04625639f01cbe55187758f3887b7c0c16e74bc4542a916205f21958c0dd8ba7a51dd300985c4ac2b600a80201ad759fe6d2ea396d7f3c36917733f2dc15f9d009b490b7645e3f99f4d25ed992b2059618afe81e5503157186a978923e4ce54bf82b007bd501ed8419def644e6ab64e92a35ec1c9df6dbdcdcb0ab5deb76a0964e99ab404d15f8ecb476584ae20c30fe3ff5bc0c01ee86214e9cbb6e8f7f01bfb77a7665250f8fdc2a1", @generic="d3c08212094296b5ef439dd8fe17458f0bec9db7bd009d8587d860a98934eca63222a5ecbf9b9b7e723b794180be22df9d8b9e809e2dc858dac3c485eac8da2c25f9dfc84850c2f7f871f7b4bd8d9da28b81a3f3220919ba410d71b2669e58b7eadc78b539b0560b3b9a7694e9925010be0a3e8d10259f18c1aeaaf74d3b38faeb7cd110004aa3630a5f3b8b42d59c316db6dc8d89f1ee0e9bcc71aa7967238958a82ae2dc1a8068c62f454eed9df7f9126a0e146b0d408d23caae96416b77daed8dbea703fedd6541ffa026540829", @typed={0x8, 0x16, @u32=0x9}, @generic="47112d531a5c6449107015eba728f4a5a30c8a00b2be349a427742dfb5fe038b87b66e5a1af52d2a7b6ad8bd44b33984ccaba96f72750a2ab3972759f88fbadb695f5691b34edabb", @typed={0xc, 0x7, @u64=0x7}]}, @generic="76877abdfcac9fce2169eabb3b82b2f32abd08dec33098daf0dd8ff2a5c18e348ec962576b8e9b84c6931280", @generic="dbf5d8b777e9305ea5152d20dc438eebd9a6e250d76cf6cb12d0066fb45e82ed88618f7a119cbc30a4e872627d2cff5efa8090dea34db5ff390756090cd7e9304100bbd99787607fa60b78710740b98134ac81cdc37cd67fb1d22c7d", @typed={0x14, 0x21, @ipv6=@dev={0xfe, 0x80, [], 0x22}}, @typed={0x8, 0xa, @pid=r4}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x4004850}, 0x4040) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000002103001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x20, r1, 0x0, 0x0) exit_group(0x0) 11:49:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000042000102000000000000000000000000c8f77ea1dd37b0f9c34052f90a9584ad68867c2b44af63067390a58e463604f28f8a704673e5a490e91de092218ed3abf0ec5fb5a69203595d02e7d2885ab0d1d267c87a9cfa9a88227d50121d517c353c9f62ec639062814a02ecbc78c1012752e8620ffa4c9457"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @mcast1, 0x2}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r1, 0x101, 0xa0, "018593b0d32d9771f22fd02618f6e5db977c8c6e8a9eab6f4db74b04aacfe247291d45c16f8303ddf467ef3b06b8ac1ab8d4e3660a6bd2191a63069485f299336fd5c74d67377e640ea15a2ae344788f128486ae76fa64223aa5a194717515eb996379e7888f83ce8cb929c983ba06869ae36874a9747c6cd32ee87d1c9d805bb77bbb2af5893bdf54d48d01067e8ba405087fd82c757dae85595afbb9419dcb"}, 0xa8) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000240)={0x0, 0x3, 0xffff, 0x1, r2}) 11:49:30 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r0, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000080)=""/178, &(0x7f0000000140)=0xb2) 11:49:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(0x0, 0xd768, 0x0) shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) dup3(r2, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) setresuid(r3, r4, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x14, 0x80000, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000100)={0x24, 0x400, 0x8, 0x1}) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) recvmmsg(r0, &(0x7f00000039c0)=[{{&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000300)=""/97, 0x61}, {&(0x7f00000001c0)=""/31, 0x1f}], 0x3, &(0x7f0000000400)=""/144, 0x90}, 0x1}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/88, 0x58}, {&(0x7f0000002580)=""/60, 0x3c}, {&(0x7f00000025c0)=""/10, 0xa}, {&(0x7f0000002600)=""/4096, 0x1000}], 0x6, &(0x7f0000003680)=""/166, 0xa6}, 0xfffffffffffffffb}, {{&(0x7f0000003740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003880)=[{&(0x7f00000037c0)=""/131, 0x83}], 0x1, &(0x7f00000038c0)=""/193, 0xc1}}], 0x3, 0x2, &(0x7f0000003a80)={0x77359400}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x14) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x2, 0x2, 0x44, &(0x7f0000ffc000/0x1000)=nil, 0x1}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003ac0)=ANY=[@ANYBLOB="14000000420001020000000000000000000000008c3bac17bbfd275ac51df959cc872608ac5644fe65db84698e22722cb475f281d3e2c56c2c376a025f632fa6f40f267d8862a282ee77"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000003b40)={'security\x00', 0x2, [{}, {}]}, 0x48) 11:49:30 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r0, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) dup3(r1, r0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) 11:49:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000080)="0adc1f125a7000000000000000") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x400000) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)) r1 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000042000102000006000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() setresuid(r4, r5, r6) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/188) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:31 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r0, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20040, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x6, 0x401, 0x3, 0x9, 0x3, 0x6}) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:31 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) close(r0) 11:49:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="60000000420000080000000000000000fc0000001400111000000000000000000000000000000000a7c3539e961218a196e12ed3030b6c59232677b5457add774a1a95bde72ea41293ac689fcc0cce99a70c0061000705000000000000000000"], 0xc}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x8810) [ 512.099520] QAT: Invalid ioctl 11:49:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() setresuid(r4, r5, r6) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/188) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 512.131231] QAT: Invalid ioctl 11:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() setresuid(r4, r5, r6) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/188) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c03ee447d79e517df8ffe70c215bd0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d13d301e080c8846eab1a9d914b0695b16dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be2f95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13233601df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1a375b63b6641fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b761dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b3089a3e30aab15ae872437e52a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d605fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c128cf35ddf4a895a56b8d141f743c9189a71387893f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f1c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7912ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48fd46a0417ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c5a4daabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076aa5f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c7814a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841918a8ed00659d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934f1a4bfdd9d0b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d38095a5739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f0247f04118448273586856e641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6692ceb4831b5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e638dd8c29d4e85011e4ba4f127fe765954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8297cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096870b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057288d66e5df04b7b734ed0957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fe8e86adafa93f218fdf5019c09292858ae38ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8f6f6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d294285497a42736454ccb62fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f7724d3191e2265bd0d694dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b51634f7c5d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f70adc786db7f33a20a752717b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eea9175ef9c574c1f873218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f85f545f507014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff", 0x1000}, 0x1006) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() setresuid(r4, r5, r6) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/188) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000080)={0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}]}) [ 512.364639] net_ratelimit: 24 callbacks suppressed [ 512.364646] protocol 88fb is buggy, dev hsr_slave_0 [ 512.374793] protocol 88fb is buggy, dev hsr_slave_1 11:49:31 executing program 0: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004080}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) r3 = getuid() setresuid(0x0, 0x0, r3) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x5) 11:49:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 512.464479] QAT: Invalid ioctl [ 512.483406] QAT: Invalid ioctl 11:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002ad, 0x0, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x28e65f76) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004080}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() setresuid(r4, r5, r6) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'lo\x00\n0\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00'}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/188) ioctl$TCFLSH(r2, 0x540b, 0x5) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x105000) 11:49:32 executing program 0: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x5) 11:49:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:32 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 11:49:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/174) bind$isdn_base(r1, &(0x7f0000000180)={0x22, 0x3, 0x8, 0x5, 0x7}, 0x6) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)={0x2, 0x1, 0x1000, 0x0, 0xfffffffffffffffc, 0x80000001}) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0xfbfffffffffffffd, 0xffffffffffffffff) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) [ 513.324651] protocol 88fb is buggy, dev hsr_slave_0 [ 513.329747] protocol 88fb is buggy, dev hsr_slave_1 11:49:32 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:32 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x42, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f00000000c0)={0x8021, 0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) accept4$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14, 0x800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @multicast2}, &(0x7f0000000540)) getpeername$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000a40)={0x0, @initdev, @dev}, &(0x7f0000000a80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000d80)=0xe8) getpeername$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e00)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@delqdisc={0x34, 0x25, 0x0, 0x70bd29, 0x25dfdbfd, {0x0, r7, {0x18, 0x1}, {0xfff2}, {0xfff1, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x4, 0x9}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x40800}, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000e40)={@remote, @local, 0x0}, &(0x7f0000000e80)=0xc) connect$rds(r0, &(0x7f00000005c0)={0x2, 0x4e20, @remote}, 0x10) accept$packet(r0, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getpeername$packet(r0, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000fc0)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000010c0)=0xe8) getsockname$packet(r0, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001180)={'hsr0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10008000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001580)={0x570, r2, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x21c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x124, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x11}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r14}, {0xf4, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0xc0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10000000}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}]}}]}, 0x570}, 0x1, 0x0, 0x0, 0x50}, 0x48004) r19 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r19, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r19, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 11:49:32 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) [ 513.404669] protocol 88fb is buggy, dev hsr_slave_0 [ 513.409792] protocol 88fb is buggy, dev hsr_slave_1 11:49:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_FREE_BUFS(0xffffffffffffffff, 0x4010641a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) r1 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3, 0xc000) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000001c0), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="740100002a0005032dbd7000ffdbdf2518000000fc00520008005e00", @ANYRES32, @ANYBLOB="2262344e8d9dc8b41cf09b0b6608b9d2a49ce41291ae0ad122670e414e363fd0f658b007ae44e038dbd054733e2368b1615d497f97d18ee38c9cca0d1f5557bd6786d9aa73bfb95441047b0b2b53dc68ddc8afac928ff994db8cbf4b97d68dac9e9b4e19ddb1ffd56eb6f7cca667139824e4164342a653dc8abaac557643a438ea3bdfac9b7038782bedeedf876763d6d2b516277920eb8bd4fac2cdb246b3bdc0cd3be83d1876d3e35286a87875588d16a804107727e8a26dbd0c143b78ed009f7c4b151ad2a2fe8619003bb8f75d041cd3547bcadfc8e436a63afd9831e9270d35fca4b4d1ff9c89dc2546430a1361439aa704ea2a55ba90f7461293e47ccc3acecdc39c6dddddcbcac9f46f192a2a70a3d8b9a4f38cc473e2725cedc7255ff667c983e3b2b583689e6ed51ec1577dfe80a8762891a36d6dbc4c23d2d1f97d6bf38037111e683b9bc89f3eeb71794ea676f67f4a444988c943f750f13dcd864796b7cf61be24983493c40fec8a40601ebfe5fa76ac9395b33cf4572c1bc9a07acf6c1241a14ada0d9dfcbb89ff2951d0c3975958262ad6c78e9440e8a8b37c53b0af"], 0x174}, 0x1, 0x0, 0x0, 0x4c050}, 0x1) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000080)={0x0, {0x2, 0xbe3}}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000240)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) getpeername$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) 11:49:32 executing program 2: mknod(&(0x7f0000000000)='./bus\x00', 0x2080008002, 0x28aa) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="0000000247e2c9dd0c7501dd839f2124a78867d3bf80813960a6617a83e8faab", 0x20}], 0x1) 11:49:32 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:32 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) [ 513.644633] protocol 88fb is buggy, dev hsr_slave_0 [ 513.649813] protocol 88fb is buggy, dev hsr_slave_1 11:49:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:33 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:33 executing program 5: ioctl(0xffffffffffffffff, 0x401, &(0x7f0000000000)="0adc1f125a123f3188b070") r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x7fffffff, 0x80000010000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101400, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1019000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$EVIOCGBITSND(r0, 0x80404532, 0x0) [ 513.724635] protocol 88fb is buggy, dev hsr_slave_0 [ 513.729729] protocol 88fb is buggy, dev hsr_slave_1 11:49:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400f82b62"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:33 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:33 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10001, 0x8400) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000080)=""/235) r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:33 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:33 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:33 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:33 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000002c0)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x8, 0x7ffe) socketpair(0x1f, 0x0, 0x5, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000240), 0x4) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x1, 0x4}, &(0x7f0000000080)=0x90) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000280)={'sit0\x00', {0x2, 0x4e21, @empty}}) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f00000001c0)={r5, 0x7bc8}, 0x8) 11:49:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:34 executing program 0: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:34 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGMRU(r2, 0x40047459, &(0x7f0000000100)) r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) 11:49:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:34 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000c0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x31, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000300)={{0x3, 0x3, 0x10001, 0x1, 0x2}}) r2 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) tgkill(r4, r3, 0x20) recvmmsg(r2, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d73ad328220b9e23051f1a323fcf2e1400002342"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:34 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:34 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x8, 0x5}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) 11:49:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, 0x0) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:34 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:34 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1000, 0x200) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000080)={0x5, 0x0, [{0x4, 0x4, 0x0, 0x0, @irqchip={0x6, 0x1ff}}, {0x3, 0x1, 0x0, 0x0, @irqchip={0x5, 0x2}}, {0x45b0984c, 0x1, 0x0, 0x0, @msi={0x1ff, 0x8, 0x1b7}}, {0xe6, 0x3, 0x0, 0x0, @sint={0xc0000000000000, 0x8}}, {0x7, 0x4, 0x0, 0x0, @irqchip={0xfffffffffffffff9, 0x9}}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:34 executing program 0: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x3, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:35 executing program 0: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000002b00)='/dev/admmidi#\x00', 0xfff, 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002b80)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000002c80)={&(0x7f0000002b40)={0x10, 0x0, 0x0, 0x11020}, 0xc, &(0x7f0000002c40)={&(0x7f0000002bc0)={0x4c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10001}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) r4 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x2, 0x40000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000000c0)={{0xffffffff, 0x5}, 'port1\x00', 0x80, 0x1025, 0x8, 0x10001, 0x80000000, 0x4, 0x8001, 0x0, 0x3, 0x3}) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000080)=0x7f) ioctl$SIOCNRDECOBS(r4, 0x89e2) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) 11:49:35 executing program 0: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x0, [], 0x0}) 11:49:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)) open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x8, 0x5, 0xffffffffffffffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x802, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 11:49:35 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, 0x0) 11:49:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000440)="0adc1f125a123f3188b070") socket$caif_stream(0x25, 0x1, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x1e4, r2, 0x820, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff800eada6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xad}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x682}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x68}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe093}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb929}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x92b1}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r3 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, 0x0) 11:49:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 11:49:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x1, 0x1) clock_gettime(0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0xa0000, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000100)) lseek(r0, 0x0, 0x1) recvmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000140)=@isdn, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/240}, {&(0x7f0000000340)=""/94}, {&(0x7f00000003c0)=""/207, 0x393}, {&(0x7f00000004c0)=""/248}, {&(0x7f00000005c0)=""/202}, {&(0x7f00000001c0)=""/42}, {&(0x7f00000006c0)=""/139}, {&(0x7f0000000780)=""/72}]}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000880)=""/219}], 0x0, &(0x7f00000009c0)=""/164}, 0x1ff}], 0x400000000000348, 0x1001f, &(0x7f0000001540)={0x0, 0x989680}) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="14009ce80bdd010200cf53b4c946fb477a0000000000000000000000"], 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:35 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, 0x0) 11:49:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 11:49:35 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, 0x0) 11:49:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4142, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x9, 0x6}) ioctl(r0, 0x7f, &(0x7f0000000240)="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") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x1d391f19fe61dcf, 0x10102, &(0x7f0000001540)) getrusage(0xffffffffffffffff, &(0x7f00000000c0)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) flock(r0, 0xb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:36 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x0, [], 0x0}) 11:49:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:36 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x0, [], 0x0}) 11:49:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) 11:49:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:36 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x0, [], 0x0}) 11:49:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000000c0)={0x1, {0x77359400}, 0xffffffff, 0xffffffffffffffbd}) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffe56, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x3f, 0x201, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, r1, r1) 11:49:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xd768, 0x400000) shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) getpriority(0x0, 0x0) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20004080}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x5) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) setresuid(0x0, r4, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x5) [ 517.485195] net_ratelimit: 16 callbacks suppressed [ 517.485222] protocol 88fb is buggy, dev hsr_slave_0 [ 517.495504] protocol 88fb is buggy, dev hsr_slave_1 11:49:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) [ 517.564639] protocol 88fb is buggy, dev hsr_slave_0 [ 517.569769] protocol 88fb is buggy, dev hsr_slave_1 11:49:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) 11:49:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 11:49:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x501000, 0x0) unlinkat(r2, &(0x7f0000000080)='./file0\x00', 0x200) 11:49:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) lseek(r0, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80a82, 0x0) 11:49:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x803, 0x3) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f00000003c0)={0x7ff, 0x0, 0x57b9171d, 0x0, 0x0, 0x5, 0x4, 0x3}, &(0x7f0000000440), &(0x7f00000004c0)={&(0x7f0000000480)={0x3}, 0x8}) 11:49:37 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 11:49:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 517.804646] protocol 88fb is buggy, dev hsr_slave_0 [ 517.809795] protocol 88fb is buggy, dev hsr_slave_1 11:49:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) openat$vsock(0xffffffffffffff9c, 0x0, 0x200, 0x0) 11:49:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f125a123f3188b070851e5432215ee9acc9e99efad359e8b7cbaaf017dde4db5d0bdc31c81bf21fc36e5a390a143fc653225fbe3d2b287c619b97c4b2f18226f82485395cc31d9a1d712349abc1a7977191f4912548dbb663b4789ebdf65433ed4207bb4fb262f251d50c32c6a4f15023dd302f30022774637c1173998b600ddbe012915eaaa20c6aa71be88f48d89b8f11cdf86567ea5abf2f68cafc2c085533f99530698a4bc873d4472d41216631e7124552e0770548b8f088cefce36efc2f2366") r1 = syz_open_dev$evdev(&(0x7f0000000580)='/dev/input/event#\x00', 0xffffffffffffffff, 0x4080) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0xfffffffffffffe37) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000240)="4c4b4c8fd2848b550b24822e9a7795b87f800a3059a4901f6d82601cca5e210f92b3123a6c82fbfa84d709b62b19cef70fd84355ce79b1e8dcbcf41b34395067bd24dccc788dae646a81a93ac1e664db96bbd74e742256afe71f7b3d458425c9d72278f479a372c3118f92db0875d1a40758b4aee11184196828e9c14c1c1bb655c316a0b4b768679f7da87fa8e6f9bce0a698cdf459ce7e295be2015f4f8c9c531818f391c5645953e408f1db96be8a0d42eeaf6458ea09af2d6527c66947ec05258fb2210cd0f4999a0c658f13a548c2a28b98b07e591a313e7a4d36c8de8c237897478135841c25e4add7c2", 0xed, 0xfffffffffffffffa) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000540)={@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={r2, 0x7, 0x507}, 0x0, &(0x7f0000000380)="3c67e60d82f8d280f7c2ffbdbbbe5d6a0e0df5e021cc50709352ac7e19e6e2497ac07b25d094c9ca5760c0e3eb7b734ecbaba5befd300ea38f336499", &(0x7f00000003c0)=""/238) [ 517.884636] protocol 88fb is buggy, dev hsr_slave_0 [ 517.889768] protocol 88fb is buggy, dev hsr_slave_1 11:49:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) 11:49:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f00000000c0)=[@register_looper, @enter_looper], 0x40, 0x0, &(0x7f0000000100)="9e5ea731a7626da1b1d95e01b26f60d974532a33b69fc13de3f36bfdc5a5047abb14628f4da9489bbfacbce627d764b9889f76b8ab29a163aee12595e57a8bad"}) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:49:37 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) [ 518.061925] WARNING: CPU: 0 PID: 29701 at kernel/workqueue.c:3020 __flush_work+0x74c/0x8a0 [ 518.070585] Kernel panic - not syncing: panic_on_warn set ... [ 518.076484] CPU: 0 PID: 29701 Comm: syz-executor.0 Not tainted 5.0.0+ #12 [ 518.083414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.092782] Call Trace: [ 518.095391] dump_stack+0x172/0x1f0 [ 518.099050] ? __flush_work+0x740/0x8a0 [ 518.103103] panic+0x2cb/0x65c [ 518.106308] ? __warn_printk+0xf3/0xf3 11:49:37 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 11:49:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x80000, 0x8) dup(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, 0x0, 0x82002, 0x12e) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r2, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) [ 518.110210] ? __flush_work+0x74c/0x8a0 [ 518.114195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.119741] ? __warn.cold+0x5/0x45 [ 518.123382] ? __flush_work+0x74c/0x8a0 [ 518.127376] __warn.cold+0x20/0x45 [ 518.130931] ? __flush_work+0x74c/0x8a0 [ 518.134915] report_bug+0x263/0x2b0 [ 518.138607] do_error_trap+0x11b/0x200 [ 518.139417] kobject: 'loop2' (00000000359c0853): kobject_uevent_env [ 518.142544] do_invalid_op+0x37/0x50 [ 518.142574] ? __flush_work+0x74c/0x8a0 [ 518.142592] invalid_op+0x14/0x20 11:49:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0), 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 518.160102] RIP: 0010:__flush_work+0x74c/0x8a0 [ 518.160138] kobject: 'loop2' (00000000359c0853): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 518.164688] Code: 74 58 e8 d7 21 26 00 fb 66 0f 1f 44 00 00 45 31 e4 e9 86 fd ff ff e8 c3 21 26 00 0f 0b 45 31 e4 e9 77 fd ff ff e8 b4 21 26 00 <0f> 0b 45 31 e4 e9 68 fd ff ff e8 a5 21 26 00 4c 89 ff 45 31 e4 e8 [ 518.164697] RSP: 0018:ffff888094597608 EFLAGS: 00010212 [ 518.164710] RAX: 0000000000040000 RBX: ffff8880a3e05440 RCX: ffffc90005de3000 [ 518.164720] RDX: 0000000000006626 RSI: ffffffff814a300c RDI: 0000000000000001 [ 518.164729] RBP: ffff888094597778 R08: ffff8880874ea240 R09: ffffed10128b2edd [ 518.164739] R10: ffffed10128b2edc R11: 0000000000000003 R12: dffffc0000000000 [ 518.164748] R13: ffff888094597750 R14: 0000000000000000 R15: 0000000000000001 [ 518.164774] ? __flush_work+0x74c/0x8a0 [ 518.164801] ? __flush_work+0x74c/0x8a0 [ 518.164818] ? retint_kernel+0x2d/0x2d [ 518.211192] kobject: 'loop5' (00000000a6fdb30a): kobject_uevent_env [ 518.213123] ? __drm_atomic_helper_crtc_destroy_state+0xf3/0x340 [ 518.237448] kobject: 'loop5' (00000000a6fdb30a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 518.238800] ? insert_work+0x3a0/0x3a0 [ 518.238825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.238841] ? refcount_sub_and_test_checked+0x154/0x200 [ 518.238857] ? refcount_dec_not_one+0x1f0/0x1f0 [ 518.288201] ? __drm_atomic_helper_crtc_destroy_state+0xf3/0x340 [ 518.294371] flush_work+0x18/0x20 [ 518.297897] vkms_atomic_crtc_destroy_state+0x2d/0x40 [ 518.303135] drm_atomic_state_default_clear+0x37c/0xd60 [ 518.308546] drm_atomic_state_clear+0x9d/0xc0 11:49:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x1, r1) ioctl(r0, 0x81, &(0x7f00000000c0)="0adc1f125a123f3188b070") r2 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, 0x0) 11:49:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") open$dir(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x2044e20, @loopback}, 0x10) add_key$user(0x0, 0x0, 0x0, 0xfffffffffffffd61, 0xfffffffffffffff8) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) stat(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) creat(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) alarm(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) [ 518.313051] __drm_atomic_state_free+0x3c/0xf0 [ 518.317642] drm_atomic_helper_set_config+0xe5/0x160 [ 518.322758] drm_mode_setcrtc+0x613/0x1490 [ 518.324650] kobject: 'loop5' (00000000a6fdb30a): kobject_uevent_env [ 518.327045] ? __schedule+0x81f/0x1cc0 [ 518.327066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.327089] ? drm_mode_getcrtc+0x870/0x870 [ 518.333497] kobject: 'loop5' (00000000a6fdb30a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 518.337358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.337379] ? trace_hardirqs_on_caller+0x6a/0x220 [ 518.337399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.337438] ? drm_mode_getcrtc+0x870/0x870 [ 518.337458] drm_ioctl_kernel+0x23b/0x2e0 [ 518.337473] ? drm_mode_getcrtc+0x870/0x870 [ 518.337489] ? drm_setversion+0x8c0/0x8c0 [ 518.379975] kobject: 'loop4' (0000000041e38183): kobject_uevent_env [ 518.383123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 518.383139] ? _copy_from_user+0xdd/0x150 [ 518.383159] drm_ioctl+0x545/0xa50 [ 518.383176] ? drm_mode_getcrtc+0x870/0x870 [ 518.411250] ? drm_version+0x3d0/0x3d0 [ 518.415192] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 518.415746] kobject: 'loop4' (0000000041e38183): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 518.420330] ? smack_log+0x415/0x540 [ 518.420348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.420383] ? drm_version+0x3d0/0x3d0 [ 518.442178] do_vfs_ioctl+0xd6e/0x1390 [ 518.446084] ? ioctl_preallocate+0x210/0x210 [ 518.450509] ? retint_kernel+0x2d/0x2d [ 518.454413] ? security_file_ioctl+0x89/0xc0 [ 518.458851] ? tomoyo_file_ioctl+0x23/0x30 11:49:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x42, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x4) [ 518.463098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.468640] ? security_file_ioctl+0x93/0xc0 [ 518.473059] ksys_ioctl+0xab/0xd0 [ 518.476529] __x64_sys_ioctl+0x73/0xb0 [ 518.480441] do_syscall_64+0x103/0x610 [ 518.484345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.489537] RIP: 0033:0x457f29 [ 518.492735] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.511645] RSP: 002b:00007fc707d7dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 518.518104] kobject: 'loop1' (0000000026fa1188): kobject_uevent_env [ 518.519357] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 518.519367] RDX: 0000000020000180 RSI: 00000000c06864a2 RDI: 0000000000000003 [ 518.519376] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 518.519385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc707d7e6d4 [ 518.519395] R13: 00000000004bfc39 R14: 00000000004d16f8 R15: 00000000ffffffff [ 518.526526] Kernel Offset: disabled [ 518.566387] Rebooting in 86400 seconds..