fffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x5, 0x3d, 0x0, "00000000000000000000000000000000800000000000000000005d53000000000000000000000000000000000000000000000000000000000000000000000000000000000000839100"}, 0x7e) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d696629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:17 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000100)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f11c37222a96c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b63709000000"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x44000) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 598.861156][T30024] kAFS: unable to lookup cell 'Ua̼֖b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:17 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2000, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x40096102, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x40a600, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xe, "2e2fc6512535f23757d5659fdf95"}, &(0x7f0000000300)=0x16) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc044565d, &(0x7f0000000240)={0x2, 0x9, 0x4, 0x70000, 0xff, {r2, r3/1000+30000}, {0x2, 0x0, 0x61, 0x5, 0x6, 0x7, "41c9bdc5"}, 0xd0a, 0x4, @planes=&(0x7f00000000c0)={0x8, 0xe2, @mem_offset=0x2006, 0x5}, 0x8, 0x0, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000100)='rw\x00', 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561ae9dccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755079870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 598.974076][T30024] kAFS: unable to lookup cell 'Ua̼֖b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:17 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 599.126978][T30041] QAT: failed to copy from user cfg_data. [ 599.143202][T30041] QAT: Invalid ioctl [ 599.153062][T30041] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' [ 599.226027][T30046] QAT: failed to copy from user cfg_data. [ 599.239575][T30046] QAT: Invalid ioctl [ 599.250337][T30046] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:17 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080024000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd030000004a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa4c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76f3ff0700007ea42263939f0fb3531a28320b46308f6e7cb3"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) setsockopt$sock_int(r0, 0x1, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x40096102, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xc) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000001c0)={'bond0\x00', 0x40}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x40096102, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40, 0x0, 0x3, 0x5, 0x4, 0x2}, 0x20) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a10874fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:17 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000100)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f11c37222a96c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b63709000000"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x44000) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:17 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 599.540742][T30055] QAT: failed to copy from user cfg_data. [ 599.586986][T30055] QAT: Invalid ioctl [ 599.620281][T30055] QAT: failed to copy from user cfg_data. [ 599.667868][T30055] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' [ 599.925965][T30055] QAT: failed to copy from user cfg_data. 14:58:18 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a749c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb1ff85032b9e5edb9b7dd5ec1bd4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda8"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x400009, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080024000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd030000004a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa4c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76f3ff0700007ea42263939f0fb3531a28320b46308f6e7cb3"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 14:58:18 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080024000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd030000004a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa4c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76f3ff0700007ea42263939f0fb3531a28320b46308f6e7cb3"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 600.486305][T30087] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:18 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:18 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket(0x9, 0x80000, 0x1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$FICLONE(r6, 0x40049409, r7) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="007892ef9e7da2b840ec540027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000301000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5576cba7f732570cd0fa468c24a8860b7f0b569c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7600000000000000000000d94ac2d6f50d50b9da3d8d2fa69b"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket(0x9, 0x80000, 0x1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$FICLONE(r6, 0x40049409, r7) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="007892ef9e7da2b840ec540027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000301000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5576cba7f732570cd0fa468c24a8860b7f0b569c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7600000000000000000000d94ac2d6f50d50b9da3d8d2fa69b"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket(0x9, 0x80000, 0x1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$FICLONE(r6, 0x40049409, r7) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:19 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:19 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:20 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:20 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="007892ef9e7da2b840ec540027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000301000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5576cba7f732570cd0fa468c24a8860b7f0b569c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7600000000000000000000d94ac2d6f50d50b9da3d8d2fa69b"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e1e, 0x0, @loopback, 0xbd}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7ffe, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd08000100034758d244000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r4}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:20 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:20 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e1e, 0x0, @loopback, 0xbd}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:20 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:21 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:21 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e1e, 0x0, @loopback, 0xbd}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7ffe, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd08000100034758d244000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r4}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:21 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x2, @loopback, 0x2}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:21 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:21 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:22 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7ffe, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd08000100034758d244000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r4}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x2, @loopback, 0x2}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:22 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c2ff40020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8c7f0cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xfffffffffffffdbb) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$EVIOCGBITKEY(r9, 0x80404521, &(0x7f0000000100)=""/28) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x2, @loopback, 0x2}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 14:58:22 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:22 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7ffe, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd08000100034758d244000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r4}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000200)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) [ 604.748089][T30276] QAT: failed to copy from user cfg_data. 14:58:23 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 604.798394][T30276] QAT: Invalid ioctl 14:58:23 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 1: syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x2, 0x80100) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:23 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 605.362854][T30307] QAT: failed to copy from user cfg_data. [ 605.430831][T30276] QAT: Invalid ioctl 14:58:23 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff03000091741797c29f9a2ad267a13f2f8ab9bb8c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b01b10cb74b12fa495f21d4deebf1c3924c3e350241bec1be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x4, 0x2, 0x2, 0x5, 0x3, 0x81, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:23 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:24 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x0, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:24 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x0, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd08000100ffffff7f000000002a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3ba576cba7f732570cd0fa468c24a8860b7f0b561c0e113f2ea0d02afd642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fc"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c2ff40020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8c7f0cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xfffffffffffffdbb) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$EVIOCGBITKEY(r9, 0x80404521, &(0x7f0000000100)=""/28) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:24 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000007f40)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000007ec0)='net/psched\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000007f00)='lo\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_procfs(r0, &(0x7f0000004840)='net/netfilter\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/snapshot\x00', 0x400, 0x0) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f0000004a00)) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x40096102, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000004a40)=0x4, 0x4) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000048c0)='NLBL_CALIPSO\x00') r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000004980)={&(0x7f0000004880), 0xc, &(0x7f0000004940)={&(0x7f0000004900)={0x14, r6, 0x300, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4008000) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x4, @multicast2}}, 0x2}, 0x8c) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmmsg(r2, &(0x7f0000007dc0)=[{{&(0x7f00000000c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x1}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="26095e438503490c7c6f0146a761db9d8a175698e5e40b3db2741e7a0edeb2dd2daf75c4416a168fabcd8cd33eef8199400b996887fee930448cee75cfb3b21898b83c9d0a403ac4d1351ed173d1315cd2b9b02839bdcc8a52c8564ea969a45798a8a52450a75e189daba62fb0fe38dca05edb5334a03e80107fb2396a1e23b861b798b6", 0x84}, {&(0x7f0000000300)="766a1e749da80324365c140fcf3169a7d4b2f956b122f298c1d9ca78143908ecf709fa0605c66c13962c2740dd9551feaad477d7a2fd6f833e93ea832d9a1207acf6eb2d9e9b0bec8ef452beb04ee89e940740401cd88c13c5420c0a0b21df9e87b2194dd0a693052599c8e2bae2f00817392346f35a7946efe34bf9e2a9abc597ac1de932254d2f53a695805b279ce39913aa926a44fc", 0x97}], 0x2, &(0x7f00000003c0)=[{0x44, 0x118, 0x7fff, "4bc3ac569535299908c8622a78ed5f897d82569e615f305a2e28a70a9240c8189d2ce8ae2e4de33733f4880e9b22384271142bf07b8b"}], 0x44}}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f00000004c0)="5e57b509048758ad329905133ca606ee58fda852836e9824059efeb87a034205eedc5a0e91640b706ce0f76519c2dda23457e94d16c53734b50e089f81d613e9681a2f40fbed160033e76c126d10fd4a63cd292fcaa6ed1f0531b56c6cc1eefd493e0a44eabb831b9c512c8f1bd05929192585e890ad1a4d391c93c8e5307d03e211ede72641cc55f4749b76bc1b64a49de90d2baa32e17714f5f4bc7a731f31", 0xa0}], 0x1, &(0x7f00000005c0)=[{0x78, 0x103, 0x6f, "fbac8136252af2f968f68361e50ebfb335e6dbf96a19c9700c4ff29931f9e1aed8f8c38ea8452ce444244e4cfe3600eac18c940a38f6efeb4d9d7650938b2152f20c72d2e7803f71f80fe2c99a1e0f9f4346147172a348e07a2c137ed0d48b9a901523991f20943226"}, {0xb4, 0x114, 0xff, "3cb3b324137b6eb16a939bfa418be79b485636418e3e53c896759596525d91a71aa017ff8a04b87144d86fbb8e8c6bd79e148bc2a663986a4b4ab05c25b601c96e4ab66dd13e9cd38f2523a696ffaebddb6125a29039f930b3512d6e38e956ef90645f13a4eb3f8661a709477cf74bf5d31e4bc65bfa3a078a53488be47a7f5f295407584eb6f3633fb90709b53823b91fc8ec93a7aed833ad3a71bbb95cd01ec3bef93aa9125b"}, {0x88, 0x117, 0x80000000, "895920992d371e7a77bab2a57eb15c66088a17a8c64425e436ba6f3db6fd8d9c0937d09c9dc2dfc8e77267996eca1a531b8b7a26c63b9244d6c25b4fd923d4bdf981474ac99381e230c53fbca1e883beaa14998f5577eb744872b81bb3d0e3bd4665db930bdd5341ca4724c21a8fd164d263c680c5ddc2661022df"}, {0x34, 0x3a, 0x1000, "79ce134396705ef7c1bd5bac76d5115238095ace098438066fbc0cd0f716d7d22a1182f10d"}, {0x100, 0x119, 0x6, "91f361c621376db4c7991522ac8ac15c74907162ab3746e2ea1e7eaec80da818879dab580eaa490617740c8a03225f242eb75048c07c0e75a3e389e4d43df30307638be03f4560ccdd0c33573cdb411e76d7e4d12dd9221ad5f670fef59656489bc31861c8de50b092d37afd7ed4233a6457efbf628759aca508ac455f91481b2bda7468a98cc460c4834a9eec603585efc82ab2bcc568a293e00cec1a7843ab4259dbf453e801cecdc7e2f96198c55662ac01dc7cf112a3bc315bbcb66f1f2d30464e3c1a0b435a01c974b52d609fd47c05ad2594529ae5b69bdbc4ee4dfbf378b58ef1ac63b704911efbc233a00babf864"}, {0x88, 0x1, 0xfffffff8, "8262aa73cc6b9c698d569659285fd1d6503588872746bf57c8510eccc62319db1dce9acb301ffece82d65a6dacc5e2473258f2c8e4c3625ad81894bc85464b26d7b28447d44d4ff67d576f9a4573c2dd04f14531769c74372fd5c52cf0b01e96c33ce827bd54dc1d22ac40659c516b39fc21aa9026a892e02808"}, {0x34, 0x108, 0xc56, "e31ba6219939b05b1e923f838de794d139c850825afe2c5dfadb590988ae091caf94ce081e1d3a"}, {0x100c, 0x88, 0x4, "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"}, {0x14, 0x3a, 0x4, "9b2061d21f41"}], 0x13c4}}, {{&(0x7f00000019c0)=@hci={0x1f, 0x9}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001a40)="d67a325177235574dbe834dba9661cf6528cb8dfd2858d4bcf69aed32393dd823aa1f4f98c3ff03196a96d588ba210d41f453c67d424d7d0890febcf8577f7ef6012ebba49aede92a66fec31c0d240ae8e1c89aac6273c9596bf822b53f498c9d3f20849b5b8ede266", 0x69}, {&(0x7f0000001ac0)="822e3088d3e6b0556dfe355bb314e2282f688b458dfc4415f433a8ac1edf0f905edce67a5135b98b49e3a36ffa5b4619ef074f00975ad3f665036e6a64b0e4dbdb4b3b303dbfa14558155d7fc7d464706a5e06c0ade2e1871855f922ae8137e2eba7c5204a6212418d77f95827537461dc8b9ce3ac9a32be43aadf6ee69597bfdff2454666413611c295b3125cab6772420587341b43476c8c15910c3973fdf6f243b74a14e85d4bf3d6af4d837c852afdf15a3d6dfb66bd04e1da10cf9ba729f33085495d0db63154859966db12abe8ec885b15ef635fc2bce21e01888979fb55a92df82089368fe9561c81", 0xec}], 0x2, &(0x7f0000001c00)=[{0xd8, 0x10e, 0x14000000, "0648ba14d6c9c0421a7c0079e841130ade591a247083cded70de9d25b9d5d69261c7ae2fde1cafe462fad46cc84c744de736a608de769adbdc880eecc159a9dbccb3ed5602d1c7264e942125d63131157a7b194dbbfac45cd3a7fb16186d03ab62b663b485952e5f60d81f02d85758174576daf4fe0e7396f0992c102193728e256d272fe93eb26c5435af0a239ee8b0a782191879c881149760e71e4e893af2a4c0f361ad2049c2a64e77609a18eb5fc5f6685f552f1dd194246fd08499a144fb0fac515404934b1c"}, {0xd8, 0x116, 0x6, "92c51dd7a7a25eb0348b35873de4cb29a77b670f35b408df8ed606c9f1510a963713047352dbaeb23fcaf86a1421bcc179ce2c895e62d732a4e882a4d89d29db9796116bb43ba7bcf1aa7fea816369fc2bf990c80954450375f642e5c162e63ea51f3e2e9a9faba8b3fe6ebb617ea809e6b66c932486a3af4a8257182c0720a78620d5c4d06f034d0f083c1d6501fcaa49d68fe074b140a53171cb82e5d4911eeefa13917374550cc8aff63667a8a453c16e4f442c21397ccf7f1ceeb8a81575772f80998662ba391e74"}, {0x68, 0x114, 0x80000000, "f075449e155e9f630e1ef9225b022a4abea37183489a2242b19e2d809f912f13229b6829aced15a5d89b4935019ec60a5fdfb98da4af8e199d5410d92b5f0db864f46347e8e0efb026d1b1db97ab57a2401e709b0f7ac7e7444d"}, {0xc, 0x11}], 0x224}}, {{&(0x7f0000001e40)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e23, 0x3}}, 0x80, &(0x7f0000003000)=[{&(0x7f0000001ec0)="6a4ff15740e9f327cc112821767fcc5ebdb7906c9d40c7652a8902c535dfb4cebbdb80e2e45cef98d09d406184ac211e74c1347e4fe118de4c6f7c35501c47fbbe1c211acca37c51524f665f07475ee3ac82c1fc0aa9f8f46d49c2d41423431e9e4eac3137092a20b430263e2929f7ba6c966c7748f6a7e71a84e00f4fa59dc948a5d08a4e0d125bc956068db2a1c1c055c6c3a48e51", 0x96}, {&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="8c1ef49d2f3095e61eda1a1b4cff01d7a7ca52fd1ea51eaf33a7283e3a84d36893656c043513ba7f0158ef5943dc8e74ce1a65d502a2a12769c4d5cd786ac7b746a5706b6b59f187f596465705a451bc9aaddd0682b0d6b6826fd917949020c874", 0x61}], 0x3, &(0x7f0000004a80)=ANY=[@ANYBLOB="100000000e010000070000f45fff34ef2d9bfc09d81951b04b061e34c0e8bbf98626436d661a5210926f1118bd7f8fadea4fb6beb8d46a49000898641c2a7157fc07061e643bda0266fa6cd9b7d0aeb06fc4c74beeab1face1f0fe91a7b03f0edb7089d6a7ce57bc91aeed7f604afdd96bc2cdfbfb485e37f966fcfdb3e4adf33984e4de3c72c8121a0e38d7fd53764f477bc3a429bf95bb6a74ee02900bbee9aee7c37442d630d55f97e1ac944cb6859581c17a00a44511592e225f22f2020a39fd2b15cc926a564bfb30ecfc4dad218092293f812ee723603ba36e309bd8e5835162c786c5fe751d"], 0x10}}, {{0xffffffffffffffff, 0x0, &(0x7f00000032c0)=[{&(0x7f0000003080)="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", 0xff}, {&(0x7f0000003180)="44bb07068a1486e3860c58bfb24d496ae221ac7e88ff02e62895eeac6f71c6b5de3866db32791bc80835590ae8c185d9d68a9a7d3920c4e3480f8d032523f0aefa0f62419be79f6448a3f65435c295278fe8d8cecc10e0082f7d0d9c9c3924769bf7e3209d07368a2480c47d9e113112f986998d94bbce9b1f083f5523044e7121e7e99226aa3df5c1676b2f752150a5fc53354662d6082d7a22f80870d2b1e8f569b711132fee808d565ad77eb5b4a8bc1534030d3ca92a794f23678490b8bd1a34b0494ffd5de5a6c1756922fcac291f25358412bc08a82e7456475143fe18770b76e74c10d51078d023b015", 0xed}, {&(0x7f0000003280)="4fbaf664852c03922dc032b5f157784684", 0x11}], 0x3, &(0x7f0000003300)=[{0xf4, 0x118, 0x20, "cad22fd520f0ea88862834c284881bc2d4aad9f223f96b6d401a1ce343b5c9cb5a2ff50089107f9d79dfebdc7ac1d91a69f7520f5fb13af8cd55946415cb5861b25b0ee2a7dc60df9fd7c5b5545a0f54ee628ccaad318270c2cb1e12f30a65f1686a625d052b5ad51c5afb66c8b39f35b14c55415a770c62411975a207d188706851b8600abd843ca1da48876b0daa65cd261d372d638d0eb7d72c0ac16864f65fe4afa3c8ac8403c8f60b870227166ccc61fdecadd5cc92fa42626dc28e5a51c133c4b943f91c1b4250232ae777fa1fa4b903fd37536c1caf5f7137b99dc80473922a626bad"}, {0x8c, 0x119, 0x80, "7d01dadd4314f1b29bd093c31e55b75dd425d040aefc2a05348544a707d47988b970e6b7ca1fd4a8aa6888028590d62fd8f52a0441a5aad255fb17070582ea16ebcf06fd982120fa291a1686c2b6b7e83f548ee3ff963c000d3b6eb7b99d1dba6199f62ec0e7ecf89778039ec4f2759ae014c9af18ab05b1778e83b9bf4329"}, {0x98, 0x117, 0xeb8a, "76bf4bca8f611e5a5571cf1d9ac5f8808380ca935348aa21ccdf972e7e490134394ea5f4ea480d6cbc8cc573c844e6deffee42044dabfe36a8838c73aa99333a10f365ef91a77b70ec9b3998857111ff7c38abc6ea6480efde82ad7f984c381cf772da0065d34080e63ea768e10a6b86be6e2ba43e915a2dc4115bba10c643f62d204f838b3e8307bd641419"}, {0x100c, 0x1, 0x3ff, "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"}, {0x10, 0x0, 0xffff0001, "23b19932"}, {0x100, 0x114, 0xfced803b, "8c78c92fb0360edcb1dfa4001db3e3e176bfec235bf7f9cdb7044ad4034f8b18df37e9a1984d7eb0e08a24f95701924b7380967b8bc8e54b67d876ffb70b55bac3599320061e760a585a58f7eb5da575e579c5a8c2df5b883c11035ab87184ecc1abf0acf76dbc11ee674761e969cfeeebe8c352d709875536b032bb37559f8e517e14f23429153ae797d6c18ad385fbea63bbbd8043bfd9d7ca2aec1a3fdf2b6690194b785601afd69c4b3b090824f0d88962a8141fefdb3b7947b558e842292a4ea8c23dd005142ba24da650804cc2b34666d29ea8a5b0fcac4fd56b829abf8d516e43857aaae9d45a41220218f3af79"}], 0x1334}}, {{&(0x7f0000004640)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x2, 0x1, 0x1, 0x1, {0xa, 0x4e22, 0x9, @remote, 0x5}}}, 0x80, &(0x7f0000004800)=[{&(0x7f00000046c0)="22bff052a998aa53bd55ad8228bbeed3081bd81cbdb2beff8cc731be8287e6256bd4e3fa24e150cff9e6b9a3d90cae70a6ceb4abf3c0bf4a28f8b2ab183014a8e8bb7e83c3f826010929cc37837142efdfee59b09f25e298b322e339f5256e142beddd711ea3a83e99aea52bf7baf78cf300d6732a2a611e6ee1cd26a9cb3268", 0x80}, {&(0x7f0000004740)="34354c1bfd977953c6caa718ef9086cedac56af816d6b721f06c5e500544e804ff59faa863515b9a8d328315e5d98489ef7391e638e547dfc925902807428528945b7c084ab257a134b28604e7c9701c18f39a6cd2f9cbe250858e7e7fbba9c16f3df961eeef233731f983d13b7f3ca1f2bb726a7823608884cad2ab8c8f0fb71195aab2f31022b31d5a7b1880462ed4f5609b29924db6a8bc7f25747b840c3f89b5efe13a0a300abd186f639cffae8fc3ebb15a19ffaa1dc7808bec5371c3", 0xbf}], 0x2, &(0x7f0000007f80)=[{0x18, 0x0, 0x5f0d4f16, "099ba2300fa2a1774be863"}, {0x4c, 0x10e, 0x8d, "ebc8855dfee513e2f8322be1fd3c5e9fcd1b3650145084df5d7ce80fa327c730c029afe5dc36c225b04321f7f80ba98ee710d7b90e605079f09dc9b153bc"}, {0x88, 0x114, 0x0, "3da48daa78bc558685afc71a1beca663570feb5ef5a1f5668b9fa2fd5b53f35dc508bfc10d22952baea2e388234f23d2784008cc24ce7a0dead22bc007c6341492039868470ab02df33c4625261fe2cfbcedb56eb9d04ac1092d35c77ffa62fb9252d122fb2136959c5d062fd55aa34947c8a5da72d1e6a9b4ed7b"}, {0x34, 0x110, 0x8, "d1ef5fe9f6828d868239dac8ab03b5ca2ad2d1e18087b2486a33c6987508c00cd285b48e64"}, {0x54, 0x1, 0x0, "f5ee655024a006d6370482c253ae9ebb12324145fd6d506b8269b9f7dd1d147cb0f6231743a728e5c1ba1f398a513da759cc2079dcd859c38ec5f140a9733c47f8013575c66b"}, {0x100c, 0x10b, 0x3ff, "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"}, {0x54, 0x29, 0x1, "702769318549bcf3c3e424c75a36c2223bd8deecddd083811a7bdde4899544d07f21b37cac0c4eb4bceb9ed633b706d7e2a639497f96098d9ab995354684bd7501fec9b43a1c"}], 0x11d4}}, {{&(0x7f0000005a40)=@l2tp={0x2, 0x0, @empty}, 0x80, &(0x7f0000006bc0)=[{&(0x7f0000005ac0)="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", 0x1000}, {&(0x7f0000006ac0)="c85be94aa688e60ba855db2b88470700e560a2798765376cb48c6727212c51e621fbe83161c355a9644d64cea62c09d03f2180aed4e00df21621d81133a341a85c24fc0047f738a0df42679f490c3006c6055f629485517f5d1e87e076ffcaf6a59679ebc8bad7eaf8cdc716894711af28bbe9a4e37b97be38f0daadb79b322109fd8ebc6e790be748770e0d02b81642fca24ab98b4dbacc44d0c265057fda70b716fe730ad8868efaea26b9f0505caab73c27f3a422a076b1914bbb2fbafaef75951e167a6c4e", 0xc7}], 0x2, &(0x7f0000006c00)=ANY=[@ANYBLOB="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"], 0x11ac}}], 0x7, 0x5) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:24 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x0, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 606.513163][T30369] QAT: failed to copy from user cfg_data. 14:58:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 606.604370][T30369] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' [ 606.652491][T30370] QAT: failed to copy from user cfg_data. [ 606.684434][T30370] QAT: Invalid ioctl 14:58:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 606.727492][T30369] QAT: failed to copy from user cfg_data. [ 606.740289][T30389] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:25 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:25 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:25 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x0, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:25 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c2ff40020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8c7f0cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xfffffffffffffdbb) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$EVIOCGBITKEY(r9, 0x80404521, &(0x7f0000000100)=""/28) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 607.015571][T30399] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:25 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b182117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa49e3974a76620e27eb4c3e350241beb7be29d6472aafebe4ccdb000000c114b6371bd8fccda836530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xb5) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 607.099491][T30399] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:25 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x240, 0x0) write$uinput_user_dev(r1, &(0x7f00000003c0)={'syz1\x00', {0xff7f, 0x3, 0xa9a2, 0x3d5}, 0x16, [0x6, 0x10001, 0xe18f, 0x3, 0x101, 0x4, 0x0, 0x380000, 0x7fff, 0x32, 0x6, 0xd6, 0x960, 0xffffffff, 0x1ff, 0x77, 0x800, 0x4, 0xfff, 0x7, 0x7, 0x4, 0xffffffff, 0x1, 0x40, 0x3, 0x20, 0xfff, 0x9e2e, 0x3, 0x7ff, 0x5, 0x0, 0x8, 0x4, 0x80000000, 0x3f, 0x3, 0x0, 0x1ff, 0x8517, 0x57db, 0x0, 0xffff, 0xfff, 0x9, 0xffffffff, 0x81, 0x1, 0x1, 0xfffffffe, 0x4, 0x16c4, 0x4, 0x98a9341, 0x7, 0xff, 0x6d9b7178, 0x7, 0x4, 0x0, 0x0, 0x8, 0x7fffffff], [0x6, 0x2, 0xff, 0x101, 0xffff, 0x3, 0x0, 0x8, 0x0, 0x100, 0xfff, 0x7419, 0x3ff, 0xa616, 0x20, 0x387a, 0x200, 0x0, 0x2, 0x2, 0x2, 0x67, 0x7fff, 0x40, 0x1ff, 0x5ce, 0x80000000, 0x98d, 0x0, 0x3, 0x6, 0x0, 0xfffffffc, 0x7, 0x2, 0x2, 0x3, 0x6dc, 0x0, 0x3, 0xe86, 0x3, 0x300, 0xffff4106, 0x1, 0x1, 0x9, 0xffffffff, 0xed, 0x0, 0x100, 0x0, 0x5, 0x9, 0x9, 0xf9e, 0x2, 0x0, 0x7fffffff, 0x5, 0x4, 0x4, 0x4, 0x8001], [0x2, 0x9, 0x1, 0xfd, 0x400, 0xfffffffd, 0x8, 0x8d5, 0x8, 0xffff0001, 0x1000, 0x9, 0x10002, 0x3, 0x7fffffff, 0x2, 0xd43c, 0x0, 0x8, 0x81, 0x5, 0xfffffe03, 0x903, 0x2, 0x4, 0x7fffffff, 0x80000001, 0xfffff801, 0x8, 0x2, 0x6, 0x84, 0x9, 0x200, 0x7, 0x100, 0x6, 0x4, 0x80000000, 0x9, 0x0, 0x3000000, 0x909, 0x100, 0xffff, 0x5, 0x81, 0xf518, 0x3ff, 0x9, 0x8, 0x1, 0x4, 0xb957, 0x9, 0x7, 0xfffeffff, 0x4, 0x5, 0x8692, 0x20, 0x20, 0x0, 0xca4], [0x3, 0x10000, 0x2, 0x10000, 0x9, 0x2, 0xe8e3, 0x2, 0x3, 0x1ff, 0x9, 0x200, 0x6, 0x3, 0x9, 0x0, 0x1, 0x9, 0xfffffffb, 0x8000, 0x2, 0x200, 0x1, 0xe622, 0x3c, 0x3, 0xfffffff7, 0xffff, 0x8001, 0xfffffffd, 0x5, 0x793a, 0x0, 0xf3, 0x7, 0x5, 0x0, 0x6, 0x5, 0x8, 0x596, 0x1, 0x1, 0x9, 0x1, 0x88, 0xd520, 0x3, 0x5, 0x6, 0xf306, 0x10000, 0x4, 0x1f, 0x8, 0x3, 0x65, 0x9, 0x9c48, 0xa7, 0x7, 0x9e, 0x1000]}, 0x45c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x40096102, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0185647, &(0x7f00000002c0)={0xa30000, 0x3, 0x3, r4, 0x0, &(0x7f0000000280)={0x990a2d, 0x4, [], @p_u32=&(0x7f0000000240)=0x21}}) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000340)={'syzkaller1\x00', &(0x7f0000000300)=@ethtool_test={0x1a, 0x5, 0x7fff, 0x2, [0x1000, 0x2]}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:25 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:25 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x0, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 607.289731][T30409] QAT: failed to copy from user cfg_data. [ 607.412096][T30425] QAT: failed to copy from user cfg_data. [ 607.455577][T30409] QAT: Invalid ioctl 14:58:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 607.485858][T30420] QAT: Invalid ioctl [ 607.504696][T30420] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' [ 607.564444][T30425] QAT: failed to copy from user cfg_data. [ 607.589265][T30435] QAT: Invalid ioctl [ 607.596328][T30425] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:26 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c2ff40020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8c7f0cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xfffffffffffffdbb) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$EVIOCGBITKEY(r9, 0x80404521, &(0x7f0000000100)=""/28) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x0, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x1, 0x0, 0x0, 0x0, 0x101, 0x9}, r0, 0x1, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") mount(&(0x7f0000000000)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d694629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d5d1152eb7ef7c9a6d007fd22e81d4b77a85738e079932377b94d331a392604c2c79ff32e2159673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:26 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1c, 0x5, 0x3, 0xfffffffffffffffc, 0x5, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0xc}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000927bd7000fddbfc250c00000020000700140006001c48e244311cfcc5bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:26 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b182117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa49e3974a76620e27eb4c3e350241beb7be29d6472aafebe4ccdb000000c114b6371bd8fccda836530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xb5) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 607.980237][T30452] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x0, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 608.076027][T30452] kAFS: unable to lookup cell 'Ua̼֔b-J qYOC&AyUp]R~ɦ"KwW8y#wM39&ǟ.!Yg<0.*ʚt5m' 14:58:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 608.194350][T30453] QAT: failed to copy from user cfg_data. 14:58:26 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x2, 0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) rename(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000480)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x40096102, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) [ 608.243974][T30453] QAT: Invalid ioctl 14:58:26 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1c, 0x5, 0x3, 0xfffffffffffffffc, 0x5, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0xc}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000927bd7000fddbfc250c00000020000700140006001c48e244311cfcc5bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x36, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x0, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 608.404149][T30474] kAFS: unparsable volume name 14:58:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 608.494851][T30474] QAT: failed to copy from user cfg_data. [ 608.562463][T30483] kAFS: unparsable volume name [ 608.610935][T30489] QAT: Invalid ioctl 14:58:26 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x0, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xffffffffffffff95) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1c, 0x5, 0x3, 0xfffffffffffffffc, 0x5, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0xc}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000927bd7000fddbfc250c00000020000700140006001c48e244311cfcc5bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x2}, {0xbef8, 0x7fff}]}, 0x14, 0x1) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) 14:58:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:27 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x36, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0x0, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r9, 0xc0045520, &(0x7f00000002c0)=0x2) 14:58:27 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x36, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x2}, {0xbef8, 0x7fff}]}, 0x14, 0x1) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) 14:58:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xffffffffffffff95) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0x0, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 609.405382][T30530] QAT: failed to copy from user cfg_data. 14:58:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:27 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x2}, {0xbef8, 0x7fff}]}, 0x14, 0x1) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) [ 609.466824][T30530] QAT: Invalid ioctl 14:58:27 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4f1c3924c68613f74c1d0bd61fd14b6371bd8fccda838530a760000838eb713ccc2c103fb8316"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r2, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r3) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r3, 0x4, 0x0, r2}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) fsync(r8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000440)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x40, 0x5}, 0xc) 14:58:27 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0x0, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r9, 0xc0045520, &(0x7f00000002c0)=0x2) 14:58:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xffffffffffffff95) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:27 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x2}, {0xbef8, 0x7fff}]}, 0x14, 0x1) 14:58:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:28 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 609.863080][T30557] QAT: failed to copy from user cfg_data. [ 609.917278][T30557] QAT: Invalid ioctl 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x0, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:28 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4f1c3924c68613f74c1d0bd61fd14b6371bd8fccda838530a760000838eb713ccc2c103fb8316"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r2, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r3) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r3, 0x4, 0x0, r2}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r5 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r5, 0x40049409, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) fsync(r8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000440)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x40, 0x5}, 0xc) 14:58:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r9, 0xc0045520, &(0x7f00000002c0)=0x2) 14:58:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:28 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x0, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:28 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x0, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:28 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 610.436247][T30589] QAT: failed to copy from user cfg_data. [ 610.485357][T30589] QAT: Invalid ioctl 14:58:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:28 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:28 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r9, 0x40096102, 0x0) 14:58:28 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 610.805458][T30615] QAT: failed to copy from user cfg_data. 14:58:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:29 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000140)) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r3) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, r8, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="481200000206010000000000000000000000000010000300686105000400000000000900020071797a3000000000050005000000355ac057eea3fc20"], 0x48}}, 0x0) 14:58:29 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 14:58:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffdfffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r1, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r2) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r2, 0x4, 0x0, r1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:29 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) 14:58:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, r7, 0x0) [ 611.699117][T30672] QAT: failed to copy from user cfg_data. [ 611.761354][T30672] QAT: Invalid ioctl 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r1, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r2) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r2, 0x4, 0x0, r1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:30 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) 14:58:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, r7, 0x0) 14:58:30 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffdfffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r1, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r2) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r2, 0x4, 0x0, r1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:30 executing program 5: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) 14:58:30 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r5) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r7, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) [ 612.381163][T30720] QAT: failed to copy from user cfg_data. 14:58:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 612.444889][T30720] QAT: Invalid ioctl 14:58:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:30 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:30 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:30 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffdfffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) ioctl$RTC_WIE_ON(r4, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 14:58:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:30 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:31 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 612.925361][T30752] QAT: failed to copy from user cfg_data. 14:58:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 612.968717][T30752] QAT: Invalid ioctl 14:58:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 14:58:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r4) 14:58:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:31 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r1, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r2) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r2, 0x4, 0x0, r1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:31 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x10c) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r4) 14:58:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 613.456346][T30787] kAFS: Bad value for 'source' 14:58:31 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 14:58:31 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:31 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x10c) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 613.731561][T30807] kAFS: Bad value for 'source' 14:58:32 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 614.026269][T30824] kAFS: Bad value for 'source' 14:58:32 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x10c) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) [ 614.319961][T30839] kAFS: Bad value for 'source' 14:58:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x0, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 14:58:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:32 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 614.620784][T30859] kAFS: Bad value for 'source' 14:58:32 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x0, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) 14:58:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:33 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x0, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 614.920948][T30875] kAFS: Bad value for 'source' 14:58:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) 14:58:33 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x0, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:33 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00110020000700140006001c48e244311cfc45bf954152d0d248dd08341e93f9fd16d11edb130001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be299422601124a13fe45cf9d64722afebe4cc68613f74c114b6fa99047d2c735647c271c03c1a132ad0f210f5b472166cd6e57da18378408249e133c1eacf39522467b14c32f17159cecd38008e36250d4473bf64527af96613f67f3dcc8308bff9fc87bc6d502c8a83475101c5d178e23b32da3f32e42d183378bb4a8bc936d7b19c394fc888babc128bd928155de4f8dd0dad06f52889b3b6f508141edb4a18ba141274909272a74d61b5d48ecc873148c83bb102a814754014637038859cdcd8f00e3602acff2443274305c28c1141fc5208fa49d3333cbac37c38e7b106d8392c69888430774b2dc31529a6b50f3a8fac181ef2335a461c54583b27c4c89a9a95e2182813e8361f196bf1288acef0d1b4c7e7edfe8befb2e1be13b4a2ce6c85270b75f57d4cb7df4b7f6d5ec8727977bcee8b05b2211a674e9b6543b22fc95bc232f86224f26be045fed3f863ce30a945d8b07624396b11d2d816d1eef5676e77fff33e86d73f488692fa676159fa190ed93189ded038027b5e54c04eea207a6e005e4e8f2c7098e2ed6c3d4ba5d64096f2870296730a155f41e8731ba57de118a3907451a03182f152a185ed648aa3c00eb62c2c849287f993a6bc3bca59d1efcff9bfc073c1f52b1c6129fedc817ccc17657d7d98e6ab989260568a2626651f"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:33 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x0, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) 14:58:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 615.329080][T30895] kAFS: Bad value for 'source' 14:58:33 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x0, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:33 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYRES32=r4], 0x1}, 0x1, 0x0, 0x0, 0x4044801}, 0x20000830) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x5, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, r2) 14:58:33 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 615.696047][T30915] kAFS: Bad value for 'source' 14:58:34 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x0, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80042407, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r2, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYRES32=r4], 0x1}, 0x1, 0x0, 0x0, 0x4044801}, 0x20000830) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x5, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 615.999818][T30931] kAFS: Bad value for 'source' 14:58:34 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x0, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 616.305242][T30951] kAFS: Bad value for 'source' 14:58:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x0, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYRES32=r4], 0x1}, 0x1, 0x0, 0x0, 0x4044801}, 0x20000830) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r5) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x5, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r5, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r7 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r8 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r8, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r7, 0x40049409, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:34 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 616.597200][T30966] kAFS: Bad value for 'source' 14:58:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) write$UHID_CREATE(r0, &(0x7f00000003c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/170, 0xaa, 0x3ff, 0x4, 0x4, 0x6e, 0xfffffff8}}, 0x11c) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:34 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x0, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x321000, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:35 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket$inet(0x2, 0x800, 0x6) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffee00000000000000000000000000000000000000000000000000000003ff44aa6998d0553296a9f535d48991d4555fcb2a679e1cf9fdf87e71241029cca7985bfc8e"], 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r11, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r12 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r12, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r13 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r13, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x6, 0x80) r14 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r14, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xffffffffffffffc1) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r15 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r15) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 616.898259][T30985] kAFS: Bad value for 'source' 14:58:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x0, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:35 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket$inet(0x2, 0x800, 0x6) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffee00000000000000000000000000000000000000000000000000000003ff44aa6998d0553296a9f535d48991d4555fcb2a679e1cf9fdf87e71241029cca7985bfc8e"], 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r11, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r12 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r12, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r13 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r13, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x6, 0x80) r14 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r14, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xffffffffffffffc1) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r15 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r15) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e388"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:36 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) socket$inet(0x2, 0x800, 0x6) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffee00000000000000000000000000000000000000000000000000000003ff44aa6998d0553296a9f535d48991d4555fcb2a679e1cf9fdf87e71241029cca7985bfc8e"], 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r11, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r12 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r12, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r13 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r13, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x6, 0x80) r14 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r14, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xffffffffffffffc1) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r15 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r15) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e388"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:36 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e388"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7636603d3722f3e5232f2a0e75b8f87bd8e421847376"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) capget(&(0x7f0000000000), 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r8, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="4c1e5ca8115300c962b2", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c265", @ANYBLOB="49409344914900000000000000c30010fa72bbb075638c02b8cb67898615e37849c9d9663ac8e342d84002c3550526361610b98dde37c1b3f314bd2e73bfe3d87e353078ed81caed60e387a92a5b36343e9158adda285c1c5079352921c5463cbe3d86633ffe4595bedd51934f354c65abd67dcf61eff6a0870905d9d52459fdf0aca2693cf3f77a7d2fff8d49a5ec51a910459cbdd22cefe29a30d1df53b2cbb2889f8b3ef0767dccc19e5cdb1e219d4c50b1bbb05f187f8d95283921f5137d81101c411963795ae0d233e13e4a8cd02fcd6a4fb60410dacc4038501f6b1baff832c905d673872e955cb34e87dfc46891b66e755a402033885c59aa240591b808e576b1233342e3ebfc9fe824c2e46d02ec9bfd17716d16858ce781d6ec45b78c716f9bf9a8f152f2b5fcade7bc7d59638da3531577f2ad9ecfbd3b418bd65015438eeba61f22f4dc37facce986c4e4e36282b7468fb3bde0476a55622a2960f839f8f58f9ee6c599", @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRESDEC=r9], 0x8, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r12 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r13, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r14) r15 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r15, &(0x7f0000000000)=[{&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r15, 0x227d, 0x0) kcmp(r14, r10, 0x0, 0xffffffffffffffff, r15) ptrace$setopts(0x4206, r14, 0x0, 0x0) r16 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x2, 0x2, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r14, r16, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r5, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r4, 0x0, 0xa, &(0x7f0000000100)='/dev/full\x00', r17}, 0x30) r19 = getpid() sched_setscheduler(r19, 0x5, &(0x7f0000000380)) r20 = getpid() sched_setscheduler(r20, 0x5, &(0x7f0000000380)) r21 = syz_open_procfs(r20, &(0x7f0000000080)='mountstats\x00') close(r21) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r21, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r22, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r23 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r24 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r24, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r23, 0x40049409, r24) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0x144) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r25) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:36 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0x0, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cb"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:36 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r9 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 618.693716][T31087] QAT: failed to copy from user cfg_data. 14:58:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:37 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0x0, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:37 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1d5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec280921177f62c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0xff, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) ioctl$VIDIOC_DQBUF(r0, 0xc0445611, &(0x7f0000000500)={0x2, 0x6, 0x4, 0x20000000, 0xffff, {0x0, 0x7530}, {0x0, 0xc, 0x2, 0xaf, 0x9, 0x0, "cac986db"}, 0x92, 0x4, @offset=0x4, 0x8345, 0x0, r8}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xc) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7636603d3722f3e5232f2a0e75b8f87bd8e421847376"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) capget(&(0x7f0000000000), 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r8, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="4c1e5ca8115300c962b2", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c265", @ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRESDEC=r9], 0x8, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r12 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r13, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r14) r15 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r15, &(0x7f0000000000)=[{&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r15, 0x227d, 0x0) kcmp(r14, r10, 0x0, 0xffffffffffffffff, r15) ptrace$setopts(0x4206, r14, 0x0, 0x0) r16 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x2, 0x2, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r14, r16, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r5, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r4, 0x0, 0xa, &(0x7f0000000100)='/dev/full\x00', r17}, 0x30) r19 = getpid() sched_setscheduler(r19, 0x5, &(0x7f0000000380)) r20 = getpid() sched_setscheduler(r20, 0x5, &(0x7f0000000380)) r21 = syz_open_procfs(r20, &(0x7f0000000080)='mountstats\x00') close(r21) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r21, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r22, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r23 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r24 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r24, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r23, 0x40049409, r24) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0x144) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r25) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:37 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0x0, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 619.350610][T31125] QAT: failed to copy from user cfg_data. [ 619.368380][ T2729] FS-Cache: Duplicate cookie detected [ 619.374165][ T2729] FS-Cache: O-cookie c=000000002cd1693b [p=000000008291f3f9 fl=222 nc=0 na=1] [ 619.383122][ T2729] FS-Cache: O-cookie d=00000000dc590f76 n=000000002519477b 14:58:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 619.390364][ T2729] FS-Cache: O-key=[56] '7561aea5ecbcaeebf2eb8a18f6f294629e1f2da1fe6a0987f18cead771796fae9f631b182682931df561f8790605f6f1e6e775029870f58d' [ 619.404652][ T2729] FS-Cache: N-cookie c=00000000bc7b91ba [p=000000008291f3f9 fl=2 nc=0 na=1] [ 619.413331][ T2729] FS-Cache: N-cookie d=00000000dc590f76 n=00000000993df733 [ 619.420563][ T2729] FS-Cache: N-key=[56] '7561aea5ecbcaeebf2eb8a18f6f294629e1f2da1fe6a0987f18cead771796fae9f631b182682931df561f8790605f6f1e6e775029870f58d' 14:58:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:37 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x0, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1d5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec280921177f62c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0xff, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) ioctl$VIDIOC_DQBUF(r0, 0xc0445611, &(0x7f0000000500)={0x2, 0x6, 0x4, 0x20000000, 0xffff, {0x0, 0x7530}, {0x0, 0xc, 0x2, 0xaf, 0x9, 0x0, "cac986db"}, 0x92, 0x4, @offset=0x4, 0x8345, 0x0, r8}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xc) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:37 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:38 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a7636603d3722f3e5232f2a0e75b8f87bd8e421847376"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x40096102, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) capget(&(0x7f0000000000), 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r8, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="4c1e5ca8115300c962b2", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c265", @ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRESDEC=r9], 0x8, 0x1) r10 = gettid() waitid(0x83b895581628fca4, r10, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r11 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r12 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r13 = dup2(r12, r11) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r13, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r14) r15 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r15, &(0x7f0000000000)=[{&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r15, 0x227d, 0x0) kcmp(r14, r10, 0x0, 0xffffffffffffffff, r15) ptrace$setopts(0x4206, r14, 0x0, 0x0) r16 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x2, 0x2, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r14, r16, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, r13, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r17}, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r5, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r17}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r17}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r17}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r17}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r4, 0x0, 0xa, &(0x7f0000000100)='/dev/full\x00', r17}, 0x30) r19 = getpid() sched_setscheduler(r19, 0x5, &(0x7f0000000380)) r20 = getpid() sched_setscheduler(r20, 0x5, &(0x7f0000000380)) r21 = syz_open_procfs(r20, &(0x7f0000000080)='mountstats\x00') close(r21) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r21, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r22, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r23 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r24 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r24, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r23, 0x40049409, r24) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0x144) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r25 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r25) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r24, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:38 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x0, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:38 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1d5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec280921177f62c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x50, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0xff, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x4, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) ioctl$VIDIOC_DQBUF(r0, 0xc0445611, &(0x7f0000000500)={0x2, 0x6, 0x4, 0x20000000, 0xffff, {0x0, 0x7530}, {0x0, 0xc, 0x2, 0xaf, 0x9, 0x0, "cac986db"}, 0x92, 0x4, @offset=0x4, 0x8345, 0x0, r8}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000003c0)=0xc) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r10) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:38 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:38 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x0, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 620.244853][T31170] QAT: failed to copy from user cfg_data. [ 620.386123][ T2885] FS-Cache: Duplicate cookie detected [ 620.391577][ T2885] FS-Cache: O-cookie c=00000000525cec5e [p=000000008291f3f9 fl=212 nc=0 na=0] [ 620.400533][ T2885] FS-Cache: O-cookie d=00000000241fef89 n=00000000241fef89 [ 620.407805][ T2885] FS-Cache: O-key=[56] '7561aea5ecbcaeebf2eb8a18f6f294629e1f2da1fe6a0987f18cead771796fae9f631b182682931df561f8790605f6f1e6e775029870f58d' [ 620.422136][ T2885] FS-Cache: N-cookie c=000000006873f675 [p=000000008291f3f9 fl=2 nc=0 na=1] 14:58:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 620.430894][ T2885] FS-Cache: N-cookie d=00000000dc590f76 n=00000000af123dd4 [ 620.438159][ T2885] FS-Cache: N-key=[56] '7561aea5ecbcaeebf2eb8a18f6f294629e1f2da1fe6a0987f18cead771796fae9f631b182682931df561f8790605f6f1e6e775029870f58d' 14:58:39 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12c7c101000000197f35874684c4f3b8576cba7f732570cd2ba468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a761aaf2cb3b608f10b3818da6527241b10cb74b12fa495f21d4deebf1c37c770211c4924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fc0700000049693064f16f9301"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b369"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:39 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12c7c101000000197f35874684c4f3b8576cba7f732570cd2ba468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a761aaf2cb3b608f10b3818da6527241b10cb74b12fa495f21d4deebf1c37c770211c4924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fc0700000049693064f16f9301"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc308"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:39 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12c7c101000000197f35874684c4f3b8576cba7f732570cd2ba468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a761aaf2cb3b608f10b3818da6527241b10cb74b12fa495f21d4deebf1c37c770211c4924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fc0700000049693064f16f9301"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="0000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000200000000000000"], 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08b"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:41 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="0000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000200000000000000"], 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:41 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:41 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x1, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="0000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000200000000000000"], 0x90) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:41 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:41 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:41 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x40096102, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRESHEX=r4], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r6, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r8 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r9 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r9, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r8, 0x40049409, r9) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb7"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:42 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r1) pkey_free(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x40096102, 0x0) setsockopt$SO_J1939_PROMISC(r2, 0x6b, 0x2, &(0x7f00000000c0)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) [ 623.955544][T31367] QAT: failed to copy from user cfg_data. 14:58:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:42 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0x2000068c) 14:58:42 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x40096102, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRESHEX=r4], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r6, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r8 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r9 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r9, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r8, 0x40049409, r9) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 624.190877][T31382] QAT: failed to copy from user cfg_data. 14:58:42 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r1) pkey_free(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x40096102, 0x0) setsockopt$SO_J1939_PROMISC(r2, 0x6b, 0x2, &(0x7f00000000c0)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 14:58:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 624.439252][T31393] QAT: failed to copy from user cfg_data. 14:58:42 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0x2000068c) 14:58:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, 0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 624.520725][T31402] QAT: failed to copy from user cfg_data. 14:58:42 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, 0x0, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000840)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x40096102, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYRESHEX=r4], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r6) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r6, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r8 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r9 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r9, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r8, 0x40049409, r9) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r11) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r1) pkey_free(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x40096102, 0x0) setsockopt$SO_J1939_PROMISC(r2, 0x6b, 0x2, &(0x7f00000000c0)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) 14:58:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', 0x0, 0x0) [ 624.851548][T31415] QAT: failed to copy from user cfg_data. 14:58:43 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0x2000068c) 14:58:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb7"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 624.917901][T31424] QAT: failed to copy from user cfg_data. 14:58:43 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, 0x0, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', 0x0, 0x0) 14:58:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) pkey_free(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x40096102, 0x0) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 14:58:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', 0x0, 0x0) [ 625.286491][T31444] QAT: failed to copy from user cfg_data. 14:58:43 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, 0x0, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70c"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) pkey_free(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x40096102, 0x0) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0)=0x1, 0x4) 14:58:43 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xcc, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 625.625984][T31465] QAT: failed to copy from user cfg_data. 14:58:43 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:43 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) pkey_free(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x40096102, 0x0) 14:58:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 625.898940][T31481] QAT: failed to copy from user cfg_data. 14:58:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) pkey_free(r0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 14:58:44 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001040)={&(0x7f00000002c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:44 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) pkey_free(r0) [ 626.308217][T31503] FAULT_INJECTION: forcing a failure. [ 626.308217][T31503] name failslab, interval 1, probability 0, space 0, times 0 [ 626.344516][T31503] CPU: 0 PID: 31503 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 626.353247][T31503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.363310][T31503] Call Trace: [ 626.366621][T31503] dump_stack+0x197/0x210 [ 626.370974][T31503] should_fail.cold+0xa/0x15 [ 626.375585][T31503] ? fault_create_debugfs_attr+0x180/0x180 [ 626.381405][T31503] ? ___might_sleep+0x163/0x2c0 [ 626.386283][T31503] __should_failslab+0x121/0x190 [ 626.391235][T31503] should_failslab+0x9/0x14 [ 626.395757][T31503] __kmalloc_track_caller+0x2dc/0x760 [ 626.401145][T31503] ? __check_object_size+0x3d/0x437 [ 626.406354][T31503] ? __kasan_check_write+0x14/0x20 [ 626.411480][T31503] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.417040][T31503] ? strndup_user+0x77/0xd0 [ 626.421562][T31503] memdup_user+0x26/0xd0 [ 626.425815][T31503] strndup_user+0x77/0xd0 [ 626.430159][T31503] keyctl_keyring_search+0xb1/0x3e0 [ 626.435365][T31503] ? keyctl_describe_key+0x530/0x530 [ 626.440655][T31503] ? ksys_write+0x1cf/0x290 [ 626.445189][T31503] ? __ia32_sys_read+0xb0/0xb0 [ 626.449964][T31503] ? trace_hardirqs_on_thunk+0x1a/0x1c 14:58:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 626.455436][T31503] ? do_fast_syscall_32+0xd1/0xe16 [ 626.460554][T31503] ? entry_SYSENTER_compat+0x70/0x7f [ 626.465859][T31503] __ia32_compat_sys_keyctl+0x19b/0x460 [ 626.471424][T31503] do_fast_syscall_32+0x27b/0xe16 [ 626.476467][T31503] entry_SYSENTER_compat+0x70/0x7f [ 626.481582][T31503] RIP: 0023:0xf7f539a9 [ 626.485658][T31503] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 626.505270][T31503] RSP: 002b:00000000f5d2e0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000120 [ 626.513693][T31503] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 000000000a941e92 [ 626.521677][T31503] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 0000000000000000 [ 626.529673][T31503] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 626.537653][T31503] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 626.545631][T31503] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:45 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) r6 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xc8, 0x0, 0x29c064750b1b5ceb) ioctl$FICLONE(r6, 0x40049409, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) lstat(&(0x7f0000000600)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r9) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, r0) 14:58:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:45 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70c"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:45 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:45 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pkey_alloc(0x0, 0x0) 14:58:45 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:58:45 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:45 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x2, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:45 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pkey_alloc(0x0, 0x0) 14:58:45 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 627.636876][T31554] FAULT_INJECTION: forcing a failure. [ 627.636876][T31554] name failslab, interval 1, probability 0, space 0, times 0 [ 627.743515][T31554] CPU: 1 PID: 31554 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 627.752266][T31554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.762355][T31554] Call Trace: [ 627.765663][T31554] dump_stack+0x197/0x210 [ 627.770015][T31554] should_fail.cold+0xa/0x15 [ 627.774624][T31554] ? fault_create_debugfs_attr+0x180/0x180 [ 627.780450][T31554] ? ___might_sleep+0x163/0x2c0 [ 627.785450][T31554] __should_failslab+0x121/0x190 [ 627.790415][T31554] should_failslab+0x9/0x14 [ 627.794938][T31554] __kmalloc_track_caller+0x2dc/0x760 [ 627.800329][T31554] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 627.806583][T31554] ? fput_many+0x12c/0x1a0 [ 627.809013][T31567] FAULT_INJECTION: forcing a failure. [ 627.809013][T31567] name failslab, interval 1, probability 0, space 0, times 0 [ 627.811002][T31554] ? strndup_user+0x77/0xd0 [ 627.811022][T31554] memdup_user+0x26/0xd0 [ 627.811038][T31554] strndup_user+0x77/0xd0 [ 627.811061][T31554] copy_mount_string+0x2a/0x40 [ 627.841416][T31554] __ia32_compat_sys_mount+0xcf/0x790 [ 627.846796][T31554] ? trace_hardirqs_on+0x67/0x240 [ 627.851821][T31554] do_fast_syscall_32+0x27b/0xe16 [ 627.856859][T31554] entry_SYSENTER_compat+0x70/0x7f [ 627.862080][T31554] RIP: 0023:0xf7f909a9 [ 627.866162][T31554] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 627.885768][T31554] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 14:58:46 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c114b6371bd8fccda838530a76"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 627.894188][T31554] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 627.902169][T31554] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 627.910242][T31554] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 627.918225][T31554] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 627.926200][T31554] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 627.951352][T31567] CPU: 0 PID: 31567 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 627.960056][T31567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.970113][T31567] Call Trace: [ 627.973412][T31567] dump_stack+0x197/0x210 [ 627.977786][T31567] should_fail.cold+0xa/0x15 [ 627.982383][T31567] ? fault_create_debugfs_attr+0x180/0x180 [ 627.988178][T31567] ? ___might_sleep+0x163/0x2c0 [ 627.993018][T31567] __should_failslab+0x121/0x190 [ 627.997941][T31567] should_failslab+0x9/0x14 [ 628.002435][T31567] __kmalloc_track_caller+0x2dc/0x760 [ 628.007816][T31567] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 628.014054][T31567] ? fput_many+0x12c/0x1a0 [ 628.018455][T31567] ? strndup_user+0x77/0xd0 [ 628.022946][T31567] memdup_user+0x26/0xd0 [ 628.027180][T31567] strndup_user+0x77/0xd0 [ 628.031498][T31567] copy_mount_string+0x2a/0x40 [ 628.036262][T31567] __ia32_compat_sys_mount+0xcf/0x790 [ 628.041627][T31567] ? trace_hardirqs_on+0x67/0x240 [ 628.046734][T31567] do_fast_syscall_32+0x27b/0xe16 [ 628.051753][T31567] entry_SYSENTER_compat+0x70/0x7f [ 628.056845][T31567] RIP: 0023:0xf7fda9a9 [ 628.060912][T31567] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 628.080611][T31567] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 628.089023][T31567] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 14:58:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pkey_alloc(0x0, 0x0) [ 628.096985][T31567] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.104942][T31567] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 628.112894][T31567] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 628.120846][T31567] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:46 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:46 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:46 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:46 executing program 3 (fault-call:2 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x3, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 628.469616][T31586] FAULT_INJECTION: forcing a failure. [ 628.469616][T31586] name failslab, interval 1, probability 0, space 0, times 0 [ 628.488205][T31587] FAULT_INJECTION: forcing a failure. [ 628.488205][T31587] name failslab, interval 1, probability 0, space 0, times 0 [ 628.504683][T31587] CPU: 1 PID: 31587 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 628.513384][T31587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.523431][T31587] Call Trace: [ 628.526717][T31587] dump_stack+0x197/0x210 [ 628.531053][T31587] should_fail.cold+0xa/0x15 [ 628.535638][T31587] ? fault_create_debugfs_attr+0x180/0x180 [ 628.541553][T31587] ? ___might_sleep+0x163/0x2c0 [ 628.546397][T31587] __should_failslab+0x121/0x190 [ 628.551328][T31587] should_failslab+0x9/0x14 [ 628.555823][T31587] __kmalloc_track_caller+0x2dc/0x760 [ 628.561205][T31587] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 628.567434][T31587] ? strndup_user+0x77/0xd0 [ 628.571926][T31587] memdup_user+0x26/0xd0 [ 628.576159][T31587] strndup_user+0x77/0xd0 [ 628.580478][T31587] copy_mount_string+0x2a/0x40 [ 628.585231][T31587] __ia32_compat_sys_mount+0xfb/0x790 [ 628.590590][T31587] ? trace_hardirqs_on+0x67/0x240 [ 628.595608][T31587] do_fast_syscall_32+0x27b/0xe16 [ 628.600622][T31587] entry_SYSENTER_compat+0x70/0x7f [ 628.605718][T31587] RIP: 0023:0xf7fda9a9 [ 628.609779][T31587] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 628.629369][T31587] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 628.637765][T31587] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 628.645731][T31587] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.653690][T31587] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 628.661646][T31587] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 628.669605][T31587] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 628.695113][T31586] CPU: 1 PID: 31586 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 628.703830][T31586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.713895][T31586] Call Trace: [ 628.717202][T31586] dump_stack+0x197/0x210 [ 628.721564][T31586] should_fail.cold+0xa/0x15 [ 628.726175][T31586] ? fault_create_debugfs_attr+0x180/0x180 [ 628.732006][T31586] ? ___might_sleep+0x163/0x2c0 [ 628.736871][T31586] __should_failslab+0x121/0x190 [ 628.741798][T31586] should_failslab+0x9/0x14 [ 628.746310][T31586] __kmalloc_track_caller+0x2dc/0x760 [ 628.751705][T31586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 628.757935][T31586] ? strndup_user+0x77/0xd0 [ 628.762431][T31586] memdup_user+0x26/0xd0 [ 628.766665][T31586] strndup_user+0x77/0xd0 [ 628.770997][T31586] copy_mount_string+0x2a/0x40 [ 628.775763][T31586] __ia32_compat_sys_mount+0xfb/0x790 [ 628.781129][T31586] ? trace_hardirqs_on+0x67/0x240 [ 628.786160][T31586] do_fast_syscall_32+0x27b/0xe16 [ 628.791207][T31586] entry_SYSENTER_compat+0x70/0x7f [ 628.796317][T31586] RIP: 0023:0xf7f909a9 [ 628.800384][T31586] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:58:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:47 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x4, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 628.819989][T31586] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 628.828399][T31586] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 628.836382][T31586] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.844360][T31586] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 628.852332][T31586] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 628.860316][T31586] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:47 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:47 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x5, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:47 executing program 3 (fault-call:2 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:47 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480), 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 629.391849][T31621] FAULT_INJECTION: forcing a failure. [ 629.391849][T31621] name failslab, interval 1, probability 0, space 0, times 0 [ 629.449820][T31626] FAULT_INJECTION: forcing a failure. [ 629.449820][T31626] name failslab, interval 1, probability 0, space 0, times 0 [ 629.480893][T31621] CPU: 1 PID: 31621 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 629.489615][T31621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.499712][T31621] Call Trace: [ 629.503027][T31621] dump_stack+0x197/0x210 [ 629.507371][T31621] should_fail.cold+0xa/0x15 [ 629.511970][T31621] ? __kasan_check_read+0x11/0x20 [ 629.517007][T31621] ? fault_create_debugfs_attr+0x180/0x180 [ 629.522825][T31621] ? ___might_sleep+0x163/0x2c0 [ 629.527690][T31621] __should_failslab+0x121/0x190 [ 629.532641][T31621] should_failslab+0x9/0x14 [ 629.537137][T31621] kmem_cache_alloc+0x2aa/0x710 [ 629.541986][T31621] ? find_held_lock+0x35/0x130 [ 629.546754][T31621] ? __might_fault+0x12b/0x1e0 [ 629.551530][T31621] getname_flags+0xd6/0x5b0 [ 629.556049][T31621] user_path_at_empty+0x2f/0x50 [ 629.560894][T31621] do_mount+0x150/0x1b50 [ 629.565145][T31621] ? copy_mount_string+0x40/0x40 [ 629.570086][T31621] ? _copy_from_user+0x12c/0x1a0 [ 629.575028][T31621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.581267][T31621] ? memdup_user+0x80/0xd0 [ 629.585679][T31621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.591921][T31621] ? copy_mount_options+0x2e8/0x3f0 [ 629.597128][T31621] __ia32_compat_sys_mount+0x664/0x790 [ 629.602596][T31621] ? trace_hardirqs_on+0x67/0x240 [ 629.607633][T31621] do_fast_syscall_32+0x27b/0xe16 [ 629.612658][T31621] entry_SYSENTER_compat+0x70/0x7f [ 629.617779][T31621] RIP: 0023:0xf7fda9a9 [ 629.621849][T31621] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 629.641552][T31621] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 629.649953][T31621] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 629.657927][T31621] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 629.665904][T31621] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 629.673877][T31621] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 629.681851][T31621] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 629.695159][T31626] CPU: 0 PID: 31626 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 629.703863][T31626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.713927][T31626] Call Trace: [ 629.717238][T31626] dump_stack+0x197/0x210 [ 629.721597][T31626] should_fail.cold+0xa/0x15 [ 629.726206][T31626] ? __kasan_check_read+0x11/0x20 [ 629.731268][T31626] ? fault_create_debugfs_attr+0x180/0x180 [ 629.737108][T31626] ? ___might_sleep+0x163/0x2c0 [ 629.742010][T31626] __should_failslab+0x121/0x190 [ 629.746980][T31626] should_failslab+0x9/0x14 [ 629.751510][T31626] kmem_cache_alloc+0x2aa/0x710 [ 629.756380][T31626] ? find_held_lock+0x35/0x130 [ 629.761166][T31626] ? __might_fault+0x12b/0x1e0 [ 629.765957][T31626] getname_flags+0xd6/0x5b0 [ 629.770491][T31626] user_path_at_empty+0x2f/0x50 [ 629.775363][T31626] do_mount+0x150/0x1b50 [ 629.779634][T31626] ? copy_mount_string+0x40/0x40 [ 629.784587][T31626] ? _copy_from_user+0x12c/0x1a0 [ 629.789551][T31626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.795813][T31626] ? memdup_user+0x80/0xd0 14:58:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:48 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480), 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 629.800253][T31626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.806512][T31626] ? copy_mount_options+0x2e8/0x3f0 [ 629.811737][T31626] __ia32_compat_sys_mount+0x664/0x790 [ 629.817219][T31626] ? trace_hardirqs_on+0x67/0x240 [ 629.822273][T31626] do_fast_syscall_32+0x27b/0xe16 [ 629.827324][T31626] entry_SYSENTER_compat+0x70/0x7f [ 629.832450][T31626] RIP: 0023:0xf7f909a9 [ 629.836534][T31626] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 629.856161][T31626] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 629.864592][T31626] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 629.872706][T31626] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 629.880697][T31626] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 629.888681][T31626] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:58:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x6, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 629.896672][T31626] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:48 executing program 2 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:48 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480), 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x7, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:48 executing program 3 (fault-call:2 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 630.272575][T31651] FAULT_INJECTION: forcing a failure. [ 630.272575][T31651] name failslab, interval 1, probability 0, space 0, times 0 [ 630.383461][T31651] CPU: 1 PID: 31651 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 630.392191][T31651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.402254][T31651] Call Trace: [ 630.405568][T31651] dump_stack+0x197/0x210 [ 630.409929][T31651] should_fail.cold+0xa/0x15 [ 630.414553][T31651] ? fault_create_debugfs_attr+0x180/0x180 [ 630.420378][T31651] ? ___might_sleep+0x163/0x2c0 [ 630.425250][T31651] __should_failslab+0x121/0x190 [ 630.430208][T31651] should_failslab+0x9/0x14 [ 630.434749][T31651] __kmalloc+0x2e0/0x770 [ 630.439003][T31651] ? save_stack+0x5c/0x90 [ 630.443351][T31651] ? tomoyo_encode2.part.0+0xf5/0x400 [ 630.448763][T31651] tomoyo_encode2.part.0+0xf5/0x400 [ 630.452000][T31661] FAULT_INJECTION: forcing a failure. [ 630.452000][T31661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.454023][T31651] ? do_fast_syscall_32+0x27b/0xe16 [ 630.472423][T31651] tomoyo_encode+0x2b/0x50 [ 630.476847][T31651] tomoyo_mount_acl+0xe0/0x840 [ 630.481620][T31651] ? debug_check_no_obj_freed+0x20a/0x43f [ 630.487352][T31651] ? __kasan_check_read+0x11/0x20 [ 630.492384][T31651] ? mark_lock+0xc2/0x1220 [ 630.496805][T31651] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 630.502347][T31651] ? __kasan_check_read+0x11/0x20 [ 630.507372][T31651] ? __lock_acquire+0x8a0/0x4a00 [ 630.512401][T31651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.518651][T31651] ? debug_smp_processor_id+0x33/0x18a [ 630.524118][T31651] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 630.530287][T31651] ? lock_acquire+0x190/0x410 [ 630.534968][T31651] ? tomoyo_mount_permission+0x10a/0x400 [ 630.540608][T31651] tomoyo_mount_permission+0x16a/0x400 [ 630.546082][T31651] ? tomoyo_mount_permission+0x10a/0x400 [ 630.551726][T31651] ? tomoyo_mount_acl+0x840/0x840 [ 630.556754][T31651] ? strncpy_from_user+0x2b4/0x400 [ 630.561872][T31651] tomoyo_sb_mount+0x35/0x40 [ 630.566456][T31651] security_sb_mount+0x87/0xd0 [ 630.571229][T31651] do_mount+0x1d4/0x1b50 [ 630.575472][T31651] ? copy_mount_string+0x40/0x40 [ 630.580430][T31651] ? _copy_from_user+0x12c/0x1a0 [ 630.585380][T31651] ? memdup_user+0x80/0xd0 [ 630.589789][T31651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.596037][T31651] ? copy_mount_options+0x2e8/0x3f0 [ 630.601254][T31651] __ia32_compat_sys_mount+0x664/0x790 [ 630.606722][T31651] ? trace_hardirqs_on+0x67/0x240 [ 630.611757][T31651] do_fast_syscall_32+0x27b/0xe16 [ 630.616791][T31651] entry_SYSENTER_compat+0x70/0x7f [ 630.621888][T31651] RIP: 0023:0xf7f909a9 [ 630.625973][T31651] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 630.645581][T31651] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 630.654002][T31651] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 630.661982][T31651] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 630.669950][T31651] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:58:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x8, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 630.677929][T31651] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 630.685914][T31651] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 630.693929][T31661] CPU: 0 PID: 31661 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 630.702620][T31661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.712724][T31661] Call Trace: [ 630.716055][T31661] dump_stack+0x197/0x210 [ 630.720421][T31661] should_fail.cold+0xa/0x15 [ 630.725033][T31661] ? fault_create_debugfs_attr+0x180/0x180 14:58:48 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 630.730867][T31661] ? __kasan_check_read+0x11/0x20 [ 630.735921][T31661] ? __lock_acquire+0x16f2/0x4a00 [ 630.740964][T31661] ? _parse_integer+0x190/0x190 [ 630.745842][T31661] should_fail_alloc_page+0x50/0x60 [ 630.751167][T31661] __alloc_pages_nodemask+0x1a1/0x910 [ 630.756565][T31661] ? fs_reclaim_release+0xf/0x30 [ 630.761527][T31661] ? __alloc_pages_slowpath+0x2900/0x2900 [ 630.767271][T31661] ? fs_reclaim_release+0xf/0x30 [ 630.772239][T31661] ? fault_create_debugfs_attr+0x180/0x180 [ 630.778076][T31661] cache_grow_begin+0x90/0xc60 14:58:49 executing program 2 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 630.782960][T31661] ? getname_flags+0xd6/0x5b0 [ 630.787656][T31661] ? trace_hardirqs_off+0x62/0x240 [ 630.792791][T31661] kmem_cache_alloc+0x64e/0x710 [ 630.797664][T31661] ? find_held_lock+0x35/0x130 [ 630.802460][T31661] getname_flags+0xd6/0x5b0 [ 630.806991][T31661] user_path_at_empty+0x2f/0x50 [ 630.811867][T31661] do_mount+0x150/0x1b50 [ 630.816139][T31661] ? copy_mount_string+0x40/0x40 [ 630.821091][T31661] ? _copy_from_user+0x12c/0x1a0 [ 630.826059][T31661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.832417][T31661] ? memdup_user+0x80/0xd0 [ 630.836852][T31661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.843136][T31661] ? copy_mount_options+0x2e8/0x3f0 [ 630.848352][T31661] __ia32_compat_sys_mount+0x664/0x790 [ 630.853834][T31661] ? trace_hardirqs_on+0x67/0x240 [ 630.858890][T31661] do_fast_syscall_32+0x27b/0xe16 [ 630.863954][T31661] entry_SYSENTER_compat+0x70/0x7f [ 630.869077][T31661] RIP: 0023:0xf7fda9a9 [ 630.873159][T31661] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 630.892877][T31661] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 630.901404][T31661] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 630.909387][T31661] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 630.917368][T31661] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 630.925345][T31661] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:58:49 executing program 5: pkey_alloc(0x0, 0x0) [ 630.933342][T31661] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 631.068504][T31672] FAULT_INJECTION: forcing a failure. [ 631.068504][T31672] name failslab, interval 1, probability 0, space 0, times 0 14:58:49 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 631.149334][T31672] CPU: 1 PID: 31672 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 631.158077][T31672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.168142][T31672] Call Trace: [ 631.171448][T31672] dump_stack+0x197/0x210 [ 631.175797][T31672] should_fail.cold+0xa/0x15 [ 631.180411][T31672] ? fault_create_debugfs_attr+0x180/0x180 [ 631.186242][T31672] ? ___might_sleep+0x163/0x2c0 [ 631.191132][T31672] __should_failslab+0x121/0x190 [ 631.196085][T31672] should_failslab+0x9/0x14 [ 631.200612][T31672] __kmalloc+0x2e0/0x770 [ 631.204875][T31672] ? __kmalloc+0x608/0x770 [ 631.209307][T31672] ? tomoyo_realpath_from_path+0xc5/0x660 [ 631.215050][T31672] tomoyo_realpath_from_path+0xc5/0x660 [ 631.220617][T31672] tomoyo_mount_acl+0x149/0x840 [ 631.225487][T31672] ? debug_check_no_obj_freed+0x20a/0x43f [ 631.231231][T31672] ? __kasan_check_read+0x11/0x20 [ 631.237525][T31672] ? mark_lock+0xc2/0x1220 [ 631.241957][T31672] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 631.247522][T31672] ? __kasan_check_read+0x11/0x20 [ 631.252568][T31672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.258819][T31672] ? debug_smp_processor_id+0x33/0x18a [ 631.264301][T31672] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 631.270487][T31672] ? lock_acquire+0x190/0x410 [ 631.275186][T31672] ? tomoyo_mount_permission+0x10a/0x400 [ 631.280835][T31672] tomoyo_mount_permission+0x16a/0x400 [ 631.286300][T31672] ? tomoyo_mount_permission+0x10a/0x400 [ 631.291942][T31672] ? tomoyo_mount_acl+0x840/0x840 [ 631.296991][T31672] ? strncpy_from_user+0x2b4/0x400 [ 631.302143][T31672] tomoyo_sb_mount+0x35/0x40 [ 631.306776][T31672] security_sb_mount+0x87/0xd0 [ 631.311569][T31672] do_mount+0x1d4/0x1b50 [ 631.315831][T31672] ? copy_mount_string+0x40/0x40 [ 631.321303][T31672] ? _copy_from_user+0x12c/0x1a0 [ 631.326359][T31672] ? memdup_user+0x80/0xd0 [ 631.330790][T31672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.337073][T31672] ? copy_mount_options+0x2e8/0x3f0 [ 631.342289][T31672] __ia32_compat_sys_mount+0x664/0x790 [ 631.347771][T31672] ? trace_hardirqs_on+0x67/0x240 [ 631.352827][T31672] do_fast_syscall_32+0x27b/0xe16 [ 631.357878][T31672] entry_SYSENTER_compat+0x70/0x7f [ 631.362992][T31672] RIP: 0023:0xf7f909a9 [ 631.367071][T31672] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 631.386688][T31672] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 14:58:49 executing program 3 (fault-call:2 fault-nth:4): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x9, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:49 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[]}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 631.395116][T31672] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 631.403102][T31672] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.411087][T31672] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 631.419099][T31672] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 631.427086][T31672] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:49 executing program 5: pkey_alloc(0x0, 0x0) [ 631.500567][T31686] FAULT_INJECTION: forcing a failure. [ 631.500567][T31686] name failslab, interval 1, probability 0, space 0, times 0 [ 631.530193][T31686] CPU: 0 PID: 31686 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 631.540229][T31686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.550298][T31686] Call Trace: [ 631.553612][T31686] dump_stack+0x197/0x210 [ 631.557965][T31686] should_fail.cold+0xa/0x15 [ 631.562680][T31686] ? fault_create_debugfs_attr+0x180/0x180 [ 631.568508][T31686] ? ___might_sleep+0x163/0x2c0 [ 631.573361][T31686] __should_failslab+0x121/0x190 [ 631.578313][T31686] should_failslab+0x9/0x14 [ 631.582835][T31686] __kmalloc+0x2e0/0x770 [ 631.587093][T31686] ? __kmalloc+0x608/0x770 [ 631.591520][T31686] ? tomoyo_realpath_from_path+0xc5/0x660 [ 631.597255][T31686] tomoyo_realpath_from_path+0xc5/0x660 [ 631.602824][T31686] tomoyo_mount_acl+0x149/0x840 [ 631.607793][T31686] ? debug_check_no_obj_freed+0x20a/0x43f [ 631.613537][T31686] ? __kasan_check_read+0x11/0x20 [ 631.618571][T31686] ? mark_lock+0xc2/0x1220 [ 631.623003][T31686] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 631.628563][T31686] ? __kasan_check_read+0x11/0x20 [ 631.633603][T31686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.639860][T31686] ? debug_smp_processor_id+0x33/0x18a 14:58:49 executing program 5: pkey_alloc(0x0, 0x0) 14:58:49 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 631.645338][T31686] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 631.651629][T31686] ? lock_acquire+0x190/0x410 [ 631.656322][T31686] ? tomoyo_mount_permission+0x10a/0x400 [ 631.662182][T31686] tomoyo_mount_permission+0x16a/0x400 [ 631.667654][T31686] ? tomoyo_mount_permission+0x10a/0x400 [ 631.671289][T31672] ERROR: Out of memory at tomoyo_realpath_from_path. [ 631.673308][T31686] ? tomoyo_mount_acl+0x840/0x840 [ 631.673340][T31686] ? strncpy_from_user+0x2b4/0x400 [ 631.673362][T31686] tomoyo_sb_mount+0x35/0x40 [ 631.673382][T31686] security_sb_mount+0x87/0xd0 [ 631.699490][T31686] do_mount+0x1d4/0x1b50 [ 631.703754][T31686] ? copy_mount_string+0x40/0x40 [ 631.708707][T31686] ? _copy_from_user+0x12c/0x1a0 [ 631.713661][T31686] ? memdup_user+0x80/0xd0 [ 631.718091][T31686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.724352][T31686] ? copy_mount_options+0x2e8/0x3f0 [ 631.729570][T31686] __ia32_compat_sys_mount+0x664/0x790 [ 631.735153][T31686] ? trace_hardirqs_on+0x67/0x240 [ 631.740205][T31686] do_fast_syscall_32+0x27b/0xe16 [ 631.745251][T31686] entry_SYSENTER_compat+0x70/0x7f [ 631.750379][T31686] RIP: 0023:0xf7fda9a9 [ 631.754452][T31686] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 631.774163][T31686] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 631.782594][T31686] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 631.790581][T31686] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 14:58:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 631.798562][T31686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 631.806546][T31686] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 631.814546][T31686] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:50 executing program 2 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xb, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 631.864327][T31686] ERROR: Out of memory at tomoyo_realpath_from_path. 14:58:50 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:50 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:50 executing program 3 (fault-call:2 fault-nth:5): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xc, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 632.143113][T31717] FAULT_INJECTION: forcing a failure. [ 632.143113][T31717] name failslab, interval 1, probability 0, space 0, times 0 [ 632.150713][T31720] FAULT_INJECTION: forcing a failure. [ 632.150713][T31720] name failslab, interval 1, probability 0, space 0, times 0 [ 632.188413][T31717] CPU: 0 PID: 31717 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 632.197133][T31717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.207369][T31717] Call Trace: [ 632.210764][T31717] dump_stack+0x197/0x210 [ 632.215111][T31717] should_fail.cold+0xa/0x15 [ 632.219714][T31717] ? fault_create_debugfs_attr+0x180/0x180 [ 632.225532][T31717] ? ___might_sleep+0x163/0x2c0 [ 632.230403][T31717] __should_failslab+0x121/0x190 [ 632.235354][T31717] should_failslab+0x9/0x14 [ 632.239875][T31717] __kmalloc+0x2e0/0x770 [ 632.244121][T31717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.250363][T31717] ? d_absolute_path+0x11b/0x170 [ 632.255307][T31717] ? __d_path+0x140/0x140 [ 632.259636][T31717] ? tomoyo_encode2.part.0+0xf5/0x400 [ 632.265012][T31717] tomoyo_encode2.part.0+0xf5/0x400 [ 632.270223][T31717] tomoyo_encode+0x2b/0x50 [ 632.274645][T31717] tomoyo_realpath_from_path+0x19c/0x660 [ 632.280287][T31717] tomoyo_mount_acl+0x149/0x840 [ 632.285137][T31717] ? debug_check_no_obj_freed+0x20a/0x43f [ 632.290864][T31717] ? __kasan_check_read+0x11/0x20 [ 632.295894][T31717] ? mark_lock+0xc2/0x1220 [ 632.300332][T31717] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 632.305879][T31717] ? __kasan_check_read+0x11/0x20 [ 632.310916][T31717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.317161][T31717] ? debug_smp_processor_id+0x33/0x18a [ 632.322617][T31717] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 632.328786][T31717] ? lock_acquire+0x190/0x410 [ 632.333451][T31717] ? tomoyo_mount_permission+0x10a/0x400 [ 632.339079][T31717] tomoyo_mount_permission+0x16a/0x400 [ 632.344534][T31717] ? tomoyo_mount_permission+0x10a/0x400 [ 632.350159][T31717] ? tomoyo_mount_acl+0x840/0x840 [ 632.355189][T31717] ? strncpy_from_user+0x2b4/0x400 [ 632.360293][T31717] tomoyo_sb_mount+0x35/0x40 [ 632.364874][T31717] security_sb_mount+0x87/0xd0 [ 632.369634][T31717] do_mount+0x1d4/0x1b50 [ 632.373873][T31717] ? copy_mount_string+0x40/0x40 [ 632.378901][T31717] ? _copy_from_user+0x12c/0x1a0 [ 632.383858][T31717] ? memdup_user+0x80/0xd0 [ 632.388283][T31717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.394516][T31717] ? copy_mount_options+0x2e8/0x3f0 [ 632.399713][T31717] __ia32_compat_sys_mount+0x664/0x790 [ 632.405162][T31717] ? trace_hardirqs_on+0x67/0x240 [ 632.410180][T31717] do_fast_syscall_32+0x27b/0xe16 [ 632.415201][T31717] entry_SYSENTER_compat+0x70/0x7f [ 632.420384][T31717] RIP: 0023:0xf7f909a9 [ 632.424441][T31717] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:58:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:50 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 632.444052][T31717] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 632.452467][T31717] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 632.460434][T31717] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 632.468416][T31717] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 632.476379][T31717] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 632.484342][T31717] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 632.530717][T31720] CPU: 1 PID: 31720 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 632.539552][T31720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.549719][T31720] Call Trace: [ 632.553025][T31720] dump_stack+0x197/0x210 [ 632.557379][T31720] should_fail.cold+0xa/0x15 [ 632.558554][T31717] ERROR: Out of memory at tomoyo_realpath_from_path. [ 632.561984][T31720] ? fault_create_debugfs_attr+0x180/0x180 [ 632.562008][T31720] ? ___might_sleep+0x163/0x2c0 [ 632.562033][T31720] __should_failslab+0x121/0x190 [ 632.584343][T31720] should_failslab+0x9/0x14 [ 632.588869][T31720] __kmalloc+0x2e0/0x770 [ 632.593134][T31720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.599381][T31720] ? d_absolute_path+0x11b/0x170 [ 632.604310][T31720] ? __d_path+0x140/0x140 [ 632.608629][T31720] ? tomoyo_encode2.part.0+0xf5/0x400 [ 632.613995][T31720] tomoyo_encode2.part.0+0xf5/0x400 [ 632.619187][T31720] tomoyo_encode+0x2b/0x50 [ 632.623612][T31720] tomoyo_realpath_from_path+0x19c/0x660 [ 632.629260][T31720] tomoyo_mount_acl+0x149/0x840 [ 632.634099][T31720] ? debug_check_no_obj_freed+0x20a/0x43f [ 632.639825][T31720] ? __kasan_check_read+0x11/0x20 [ 632.644837][T31720] ? mark_lock+0xc2/0x1220 [ 632.649244][T31720] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 632.654781][T31720] ? __kasan_check_read+0x11/0x20 [ 632.659816][T31720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.666047][T31720] ? debug_smp_processor_id+0x33/0x18a [ 632.671514][T31720] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 632.677701][T31720] ? lock_acquire+0x190/0x410 [ 632.682375][T31720] ? tomoyo_mount_permission+0x10a/0x400 [ 632.688008][T31720] tomoyo_mount_permission+0x16a/0x400 [ 632.693455][T31720] ? tomoyo_mount_permission+0x10a/0x400 [ 632.699079][T31720] ? tomoyo_mount_acl+0x840/0x840 [ 632.704104][T31720] ? strncpy_from_user+0x2b4/0x400 [ 632.709221][T31720] tomoyo_sb_mount+0x35/0x40 [ 632.713805][T31720] security_sb_mount+0x87/0xd0 [ 632.718565][T31720] do_mount+0x1d4/0x1b50 [ 632.722847][T31720] ? copy_mount_string+0x40/0x40 [ 632.727801][T31720] ? _copy_from_user+0x12c/0x1a0 [ 632.732745][T31720] ? memdup_user+0x80/0xd0 [ 632.737158][T31720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.743397][T31720] ? copy_mount_options+0x2e8/0x3f0 [ 632.748595][T31720] __ia32_compat_sys_mount+0x664/0x790 [ 632.754052][T31720] ? trace_hardirqs_on+0x67/0x240 [ 632.759078][T31720] do_fast_syscall_32+0x27b/0xe16 [ 632.764107][T31720] entry_SYSENTER_compat+0x70/0x7f [ 632.769224][T31720] RIP: 0023:0xf7fda9a9 [ 632.773281][T31720] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 632.792886][T31720] RSP: 002b:00000000f5dd60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 632.801290][T31720] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 632.809259][T31720] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 632.817217][T31720] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:58:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:51 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) [ 632.825176][T31720] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 632.833148][T31720] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:51 executing program 2 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:51 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b5"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:51 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 633.061096][T31720] ERROR: Out of memory at tomoyo_realpath_from_path. [ 633.075848][T31742] FAULT_INJECTION: forcing a failure. [ 633.075848][T31742] name failslab, interval 1, probability 0, space 0, times 0 [ 633.127514][T31742] CPU: 0 PID: 31742 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 633.136253][T31742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.146433][T31742] Call Trace: [ 633.149747][T31742] dump_stack+0x197/0x210 [ 633.154208][T31742] should_fail.cold+0xa/0x15 [ 633.158823][T31742] ? fault_create_debugfs_attr+0x180/0x180 [ 633.164655][T31742] ? ___might_sleep+0x163/0x2c0 [ 633.169534][T31742] __should_failslab+0x121/0x190 [ 633.174500][T31742] should_failslab+0x9/0x14 [ 633.179031][T31742] __kmalloc+0x2e0/0x770 [ 633.183296][T31742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.189551][T31742] ? d_absolute_path+0x11b/0x170 [ 633.194505][T31742] ? __d_path+0x140/0x140 [ 633.198855][T31742] ? tomoyo_encode2.part.0+0xf5/0x400 [ 633.204254][T31742] tomoyo_encode2.part.0+0xf5/0x400 [ 633.209474][T31742] tomoyo_encode+0x2b/0x50 [ 633.213913][T31742] tomoyo_realpath_from_path+0x19c/0x660 [ 633.219574][T31742] tomoyo_mount_acl+0x149/0x840 [ 633.224441][T31742] ? debug_check_no_obj_freed+0x20a/0x43f [ 633.230177][T31742] ? __kasan_check_read+0x11/0x20 [ 633.235213][T31742] ? mark_lock+0xc2/0x1220 [ 633.239655][T31742] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 633.245232][T31742] ? __kasan_check_read+0x11/0x20 [ 633.250288][T31742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.256561][T31742] ? debug_smp_processor_id+0x33/0x18a [ 633.262139][T31742] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 633.268352][T31742] ? lock_acquire+0x190/0x410 [ 633.273053][T31742] ? tomoyo_mount_permission+0x10a/0x400 [ 633.278718][T31742] tomoyo_mount_permission+0x16a/0x400 [ 633.284198][T31742] ? tomoyo_mount_permission+0x10a/0x400 [ 633.289846][T31742] ? tomoyo_mount_acl+0x840/0x840 [ 633.294903][T31742] ? strncpy_from_user+0x2b4/0x400 [ 633.300033][T31742] tomoyo_sb_mount+0x35/0x40 [ 633.304746][T31742] security_sb_mount+0x87/0xd0 [ 633.309531][T31742] do_mount+0x1d4/0x1b50 [ 633.313796][T31742] ? copy_mount_string+0x40/0x40 [ 633.318747][T31742] ? _copy_from_user+0x12c/0x1a0 [ 633.323708][T31742] ? memdup_user+0x80/0xd0 [ 633.328151][T31742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.334404][T31742] ? copy_mount_options+0x2e8/0x3f0 [ 633.339622][T31742] __ia32_compat_sys_mount+0x664/0x790 [ 633.345094][T31742] ? trace_hardirqs_on+0x67/0x240 [ 633.350136][T31742] do_fast_syscall_32+0x27b/0xe16 [ 633.355187][T31742] entry_SYSENTER_compat+0x70/0x7f [ 633.360303][T31742] RIP: 0023:0xf7f909a9 [ 633.364390][T31742] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 633.384021][T31742] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 633.392449][T31742] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 633.400426][T31742] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 633.408399][T31742] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 633.416368][T31742] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:58:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 14:58:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 633.424347][T31742] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 633.469505][T31742] ERROR: Out of memory at tomoyo_realpath_from_path. 14:58:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xd, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:51 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b5"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:51 executing program 2 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 633.699895][T31764] FAULT_INJECTION: forcing a failure. [ 633.699895][T31764] name failslab, interval 1, probability 0, space 0, times 0 14:58:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="385561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 633.779949][T31764] CPU: 0 PID: 31764 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 633.788671][T31764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.798727][T31764] Call Trace: [ 633.802017][T31764] dump_stack+0x197/0x210 [ 633.806364][T31764] should_fail.cold+0xa/0x15 [ 633.810970][T31764] ? fault_create_debugfs_attr+0x180/0x180 [ 633.816792][T31764] ? ___might_sleep+0x163/0x2c0 [ 633.821669][T31764] __should_failslab+0x121/0x190 [ 633.826613][T31764] should_failslab+0x9/0x14 [ 633.831143][T31764] __kmalloc+0x2e0/0x770 [ 633.835399][T31764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.841654][T31764] ? d_absolute_path+0x11b/0x170 [ 633.846599][T31764] ? __d_path+0x140/0x140 [ 633.850945][T31764] ? tomoyo_encode2.part.0+0xf5/0x400 [ 633.856328][T31764] tomoyo_encode2.part.0+0xf5/0x400 [ 633.861541][T31764] tomoyo_encode+0x2b/0x50 [ 633.865970][T31764] tomoyo_realpath_from_path+0x19c/0x660 [ 633.871617][T31764] tomoyo_mount_acl+0x149/0x840 [ 633.876475][T31764] ? debug_check_no_obj_freed+0x20a/0x43f [ 633.882205][T31764] ? __kasan_check_read+0x11/0x20 [ 633.887236][T31764] ? mark_lock+0xc2/0x1220 [ 633.891662][T31764] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 633.897215][T31764] ? __kasan_check_read+0x11/0x20 [ 633.902237][T31764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.908473][T31764] ? debug_smp_processor_id+0x33/0x18a [ 633.914013][T31764] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 633.920188][T31764] ? lock_acquire+0x190/0x410 [ 633.924856][T31764] ? tomoyo_mount_permission+0x10a/0x400 [ 633.930488][T31764] tomoyo_mount_permission+0x16a/0x400 [ 633.935938][T31764] ? tomoyo_mount_permission+0x10a/0x400 [ 633.941574][T31764] ? tomoyo_mount_acl+0x840/0x840 [ 633.946604][T31764] ? strncpy_from_user+0x2b4/0x400 [ 633.951710][T31764] tomoyo_sb_mount+0x35/0x40 [ 633.956295][T31764] security_sb_mount+0x87/0xd0 [ 633.961059][T31764] do_mount+0x1d4/0x1b50 [ 633.965297][T31764] ? copy_mount_string+0x40/0x40 [ 633.970227][T31764] ? _copy_from_user+0x12c/0x1a0 [ 633.975160][T31764] ? memdup_user+0x80/0xd0 [ 633.979565][T31764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.985798][T31764] ? copy_mount_options+0x2e8/0x3f0 [ 633.990993][T31764] __ia32_compat_sys_mount+0x664/0x790 [ 633.996443][T31764] ? trace_hardirqs_on+0x67/0x240 [ 634.001464][T31764] do_fast_syscall_32+0x27b/0xe16 [ 634.006493][T31764] entry_SYSENTER_compat+0x70/0x7f [ 634.011597][T31764] RIP: 0023:0xf7f909a9 [ 634.015658][T31764] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 634.035254][T31764] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 634.043652][T31764] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 634.051627][T31764] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 634.059614][T31764] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 634.067579][T31764] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:58:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:52 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b5"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 634.075538][T31764] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xe, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 634.119041][T31775] kAFS: unparsable volume name [ 634.163646][T31779] kAFS: unparsable volume name 14:58:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:52 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da6527241"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) [ 634.285477][T31764] ERROR: Out of memory at tomoyo_realpath_from_path. 14:58:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xf, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 634.380783][T31792] kAFS: unparsable volume name [ 634.420611][T31794] kAFS: unparsable volume name 14:58:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 634.554392][T31803] kAFS: unparsable volume name [ 634.590388][T31806] kAFS: unparsable volume name 14:58:52 executing program 2 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 14:58:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:52 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da6527241"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x10, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 14:58:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) [ 634.796087][T31820] FAULT_INJECTION: forcing a failure. [ 634.796087][T31820] name failslab, interval 1, probability 0, space 0, times 0 [ 634.866876][T31820] CPU: 0 PID: 31820 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 634.875595][T31820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.885651][T31820] Call Trace: [ 634.888952][T31820] dump_stack+0x197/0x210 [ 634.893299][T31820] should_fail.cold+0xa/0x15 [ 634.897903][T31820] ? fault_create_debugfs_attr+0x180/0x180 [ 634.903828][T31820] ? ___might_sleep+0x163/0x2c0 [ 634.908692][T31820] __should_failslab+0x121/0x190 [ 634.913636][T31820] should_failslab+0x9/0x14 [ 634.918135][T31820] __kmalloc+0x2e0/0x770 [ 634.922387][T31820] ? tomoyo_encode2.part.0+0xf5/0x400 [ 634.927801][T31820] tomoyo_encode2.part.0+0xf5/0x400 [ 634.933534][T31820] ? __get_fs_type+0x9a/0xd0 [ 634.938124][T31820] tomoyo_encode+0x2b/0x50 [ 634.942548][T31820] tomoyo_mount_acl+0x320/0x840 [ 634.947406][T31820] ? debug_check_no_obj_freed+0x20a/0x43f [ 634.953126][T31820] ? mark_lock+0xc2/0x1220 [ 634.957536][T31820] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 634.963088][T31820] ? __kasan_check_read+0x11/0x20 [ 634.968121][T31820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.974364][T31820] ? debug_smp_processor_id+0x33/0x18a [ 634.979843][T31820] ? lock_acquire+0x190/0x410 [ 634.984524][T31820] ? tomoyo_mount_permission+0x10a/0x400 [ 634.990344][T31820] tomoyo_mount_permission+0x16a/0x400 [ 634.995890][T31820] ? tomoyo_mount_permission+0x10a/0x400 [ 635.001532][T31820] ? tomoyo_mount_acl+0x840/0x840 [ 635.006588][T31820] ? strncpy_from_user+0x2b4/0x400 [ 635.011718][T31820] tomoyo_sb_mount+0x35/0x40 [ 635.016317][T31820] security_sb_mount+0x87/0xd0 [ 635.021093][T31820] do_mount+0x1d4/0x1b50 [ 635.025346][T31820] ? copy_mount_string+0x40/0x40 [ 635.030284][T31820] ? _copy_from_user+0x12c/0x1a0 [ 635.035229][T31820] ? memdup_user+0x80/0xd0 [ 635.039654][T31820] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.045985][T31820] ? copy_mount_options+0x2e8/0x3f0 [ 635.051181][T31820] __ia32_compat_sys_mount+0x664/0x790 [ 635.056651][T31820] ? trace_hardirqs_on+0x67/0x240 [ 635.061695][T31820] do_fast_syscall_32+0x27b/0xe16 [ 635.066745][T31820] entry_SYSENTER_compat+0x70/0x7f [ 635.071857][T31820] RIP: 0023:0xf7f909a9 [ 635.075929][T31820] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 635.095549][T31820] RSP: 002b:00000000f5d8c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 635.103976][T31820] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 14:58:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:53 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da6527241"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 635.111952][T31820] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 635.119927][T31820] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 635.127901][T31820] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 635.135870][T31820] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:53 executing program 2 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="255561aea5ccbcaecbf2eb8a18d6d294629e1f2da1fe4a0987f18cead771594fae9f431b182682931dd541d8790605d6d1c6c755029870f58d3a1152eb7ef7c9a6d007fd22e88f00000000000000932377b94d331a3926d1dcc9ebc7eb36c3673cc5302e2ae7ca9a1b97f0a1ae74fbbf8b35f694e0ac6d3abb064d054bb4b8505435f1cf7808c3184a249bd37a484e22ace1f4f1c9a922488f06c2419ebba7c1e159c07b3b59858aaa7ca5387d9c5cdfdb991e229e968b3eb9db7cddb3ae0e4047ebd739e2b81552f545152499e232662989a2cdffcb182f8ca425ad55957cb270b50f12d5a480e2f45bda75c63f4598de1621bca4952f5f28455ef1ff2158deb13d2cdc38c988d3acc8e38802c12567632273b9aa5b56d092d394b56af0bb3f1469b0b5e29a2cc5cc36903d6f85df63a4e58d2360a133e1cbc348c3c9e6dccfe86a6ed00e21d3c41efcb4832b9269c25a25618f9f257609b36930ad3604e08bb70cc3081c"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:53 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 14:58:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x11, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) [ 635.618503][T31855] FAULT_INJECTION: forcing a failure. [ 635.618503][T31855] name failslab, interval 1, probability 0, space 0, times 0 [ 635.701595][T31855] CPU: 1 PID: 31855 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 635.710324][T31855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.720390][T31855] Call Trace: [ 635.723705][T31855] dump_stack+0x197/0x210 [ 635.728061][T31855] should_fail.cold+0xa/0x15 [ 635.732673][T31855] ? fault_create_debugfs_attr+0x180/0x180 [ 635.738507][T31855] ? ___might_sleep+0x163/0x2c0 [ 635.743379][T31855] __should_failslab+0x121/0x190 [ 635.748339][T31855] should_failslab+0x9/0x14 [ 635.752857][T31855] kmem_cache_alloc_trace+0x2d3/0x790 [ 635.758255][T31855] alloc_fs_context+0x5a/0x810 [ 635.763042][T31855] ? _raw_read_unlock+0x28/0x40 [ 635.767914][T31855] fs_context_for_mount+0x25/0x30 [ 635.772952][T31855] do_mount+0x11b2/0x1b50 [ 635.777303][T31855] ? copy_mount_string+0x40/0x40 [ 635.782252][T31855] ? _copy_from_user+0x12c/0x1a0 [ 635.787217][T31855] ? memdup_user+0x80/0xd0 [ 635.791742][T31855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.798001][T31855] ? copy_mount_options+0x2e8/0x3f0 [ 635.803214][T31855] __ia32_compat_sys_mount+0x664/0x790 [ 635.808686][T31855] ? trace_hardirqs_on+0x67/0x240 [ 635.813731][T31855] do_fast_syscall_32+0x27b/0xe16 [ 635.818788][T31855] entry_SYSENTER_compat+0x70/0x7f [ 635.823914][T31855] RIP: 0023:0xf7f909a9 [ 635.827997][T31855] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:58:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x8, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 635.848906][T31855] RSP: 002b:00000000f5d6b0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 635.857332][T31855] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 635.865417][T31855] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 635.873391][T31855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 635.881373][T31855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 635.889361][T31855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:58:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x12, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) 14:58:54 executing program 2 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) 14:58:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) 14:58:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x8, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0) [ 636.241867][ T2727] ------------[ cut here ]------------ [ 636.247836][ T2727] name 'ua켮/b-j qyoc&ayup' [ 636.255950][ T2727] WARNING: CPU: 0 PID: 2727 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 636.265164][ T2727] Kernel panic - not syncing: panic_on_warn set ... [ 636.271762][ T2727] CPU: 0 PID: 2727 Comm: kworker/0:13 Not tainted 5.5.0-rc7-syzkaller #0 [ 636.280276][ T2727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.290354][ T2727] Workqueue: afs afs_manage_cell [ 636.295296][ T2727] Call Trace: [ 636.298599][ T2727] dump_stack+0x197/0x210 [ 636.302950][ T2727] ? __xlate_proc_name+0x50/0x110 [ 636.307980][ T2727] panic+0x2e3/0x75c [ 636.311891][ T2727] ? add_taint.cold+0x16/0x16 [ 636.316587][ T2727] ? __kasan_check_write+0x14/0x20 [ 636.321707][ T2727] ? __warn.cold+0x14/0x3e [ 636.326131][ T2727] ? __warn+0xd9/0x1cf [ 636.330218][ T2727] ? __xlate_proc_name+0xe7/0x110 [ 636.335255][ T2727] __warn.cold+0x2f/0x3e 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c1"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 636.339503][ T2727] ? __xlate_proc_name+0xe7/0x110 [ 636.344541][ T2727] report_bug+0x289/0x300 [ 636.348883][ T2727] do_error_trap+0x11b/0x200 [ 636.353485][ T2727] do_invalid_op+0x37/0x50 [ 636.357923][ T2727] ? __xlate_proc_name+0xe7/0x110 [ 636.362956][ T2727] invalid_op+0x23/0x30 [ 636.367127][ T2727] RIP: 0010:__xlate_proc_name+0xe7/0x110 [ 636.372779][ T2727] Code: af 09 91 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 09 91 ff 4c 89 fe 48 c7 c7 40 07 39 88 e8 88 b9 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 b7 c9 ce ff e9 3d ff ff [ 636.392494][ T2727] RSP: 0018:ffffc9000889f9d0 EFLAGS: 00010282 [ 636.398668][ T2727] RAX: 0000000000000000 RBX: ffff88808fdc4144 RCX: 0000000000000000 [ 636.406755][ T2727] RDX: 0000000000000000 RSI: ffffffff815e5326 RDI: fffff52001113f2c [ 636.412100][T31897] FAULT_INJECTION: forcing a failure. [ 636.412100][T31897] name failslab, interval 1, probability 0, space 0, times 0 [ 636.414732][ T2727] RBP: ffffc9000889fa00 R08: ffff8880a0386600 R09: fffffbfff165e79e [ 636.414759][ T2727] R10: fffffbfff165e79d R11: ffffffff8b2f3cef R12: 0000000000000000 [ 636.414768][ T2727] R13: ffff88808fdc4139 R14: ffffc9000889fb08 R15: ffff88808fdc4139 [ 636.414799][ T2727] ? vprintk_func+0x86/0x189 [ 636.414823][ T2727] __proc_create+0xac/0x860 [ 636.414838][ T2727] ? pde_free+0x110/0x110 [ 636.414862][ T2727] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 636.414880][ T2727] proc_mkdir_data+0xbc/0x1b0 [ 636.414894][ T2727] ? proc_symlink+0x1c0/0x1c0 [ 636.414912][ T2727] ? fscache_free_cookie+0x110/0x1c0 [ 636.414930][ T2727] afs_proc_cell_setup+0x95/0x190 14:58:54 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x2000000000000) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1b, 0x5, 0x7fff, 0xfffffffffffffffc, 0x2000000000001, 0x1}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000400)={{0x0, 0x2, 0x5, 0x2, 0x100000001}, 0xad, 0x2, 0x4}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="000027bd7000fddbdf250c00000020000700140006001c48e244311cfc45bf954152d0d248dd080001000300000008000400ff0300008c2a0027ebe7f20cfefce6273b12b9c140f1c5a9197f35874684c4f3b8576cba7f732570cd0fa468c24a8860b7f0b561c0e1d642291efeeed8db1915d5c2d57b18dcec28092117a762c2f2b3e26d2e85067403653d47cb3b608f10b3818da65272411b8cb10cb74b12fa495f21d4deebf1c3924c3e350241beb7be29d64722afebe4cc68613f74c1"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x20000030) ioctl$RTC_WIE_ON(r3, 0x700f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x3d, 0x0, "000000000000000000000000000000008000"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000300)={0x3, 0x9, 0x4, 0x2, 0x806, {0x0, 0x7530}, {0x2, 0x2, 0x0, 0x5, 0x3, 0x20, "f060e0a0"}, 0x2, 0x3, @fd=r4, 0x4, 0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000000)={0x7}, 0x1) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @remote}, 0x1c) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x61b) r6 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xd1, &(0x7f00000007c0)=0x3ff, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x9, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') close(r8) close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000680)={0x2, 0x1, 0x0, 0x4ee1, 0xfff}, 0xc) [ 636.414951][ T2727] afs_manage_cell+0x54b/0x1410 [ 636.495670][ T2727] ? afs_put_cell.part.0+0x180/0x180 [ 636.500980][ T2727] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 636.506547][ T2727] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 636.512545][ T2727] ? trace_hardirqs_on+0x67/0x240 [ 636.517672][ T2727] process_one_work+0x9af/0x1740 [ 636.522631][ T2727] ? pwq_dec_nr_in_flight+0x320/0x320 [ 636.528005][ T2727] ? lock_acquire+0x190/0x410 [ 636.532698][ T2727] worker_thread+0x98/0xe40 [ 636.537226][ T2727] kthread+0x361/0x430 [ 636.541414][ T2727] ? process_one_work+0x1740/0x1740 [ 636.546616][ T2727] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 636.552345][ T2727] ret_from_fork+0x24/0x30 [ 636.558289][ T2727] Kernel Offset: disabled [ 636.566910][ T2727] Rebooting in 86400 seconds..